Bvoxro Stack

CloudZ RAT and Pheno Plugin: 10 Critical Facts About Credential and OTP Theft

CloudZ RAT uses the Pheno plugin to steal credentials and OTPs, exploiting features like Windows Phone Link. Learn 10 critical facts about this intrusion.

Bvoxro Stack · 2026-05-06 11:58:45 · Cybersecurity

Cybersecurity researchers have uncovered a sophisticated intrusion campaign that leverages a remote access tool known as CloudZ RAT, coupled with a newly discovered plugin called Pheno. This combination is specifically designed to steal user credentials and intercept one-time passwords (OTPs), posing a serious threat to individuals and organizations. Below are 10 essential facts you need to know about this emerging threat.

1. The Emergence of CloudZ RAT

CloudZ RAT is a remote access trojan that grants attackers full control over infected systems. Unlike generic malware, it is often used in targeted intrusions to maintain persistence, execute commands, and exfiltrate sensitive data. Its modular architecture allows seamless integration of additional plugins, such as Pheno, to expand its capabilities. Researchers first identified CloudZ RAT in recent cyber attacks, where it was deployed alongside other advanced persistent threat (APT) techniques. The tool's sophistication lies in its ability to hide within legitimate processes, making detection difficult for traditional antivirus solutions.

CloudZ RAT and Pheno Plugin: 10 Critical Facts About Credential and OTP Theft
Source: feeds.feedburner.com

2. The Undocumented Pheno Plugin

Pheno is a previously unknown plugin that works exclusively with CloudZ RAT to enhance its data theft functions. According to cybersecurity experts, the plugin is tailored to capture credentials entered by users, including usernames and passwords. It also monitors authentication flows to intercept one-time passwords (OTPs) sent via SMS or authenticator apps. This dual capability makes Pheno particularly dangerous for bypassing multi-factor authentication (MFA). The plugin's code is heavily obfuscated, indicating careful development to evade security tools and prolong its operational lifespan.

3. How the Attack Vector Works

The attack typically begins with a phishing email or a malicious download that installs CloudZ RAT on the victim's device. Once inside, the RAT establishes a command-and-control (C2) channel to receive instructions from the attacker. The Pheno plugin is then loaded to hook into system processes that handle keyboard input, clipboard content, and web browser data. By monitoring these inputs, the plugin can capture credentials in real time, even from secure websites. The entire process operates stealthily, without alerting the user or interfering with normal device function.

4. Credential Theft Mechanism

The primary goal of Pheno is to steal credentials—usernames and passwords—from various sources. It uses keylogging to record keystrokes, form grabbing to extract data submitted in web forms, and memory scraping to pull credentials from password managers. These stolen credentials are then encrypted and exfiltrated to the attacker's C2 server. The plugin also targets saved credentials in browsers and email clients, ensuring a broad harvest of access data. This method effectively bypasses security measures like auto-fill protection and session timeouts.

5. One-Time Passwords at Risk

One-time passwords (OTPs) are often considered a strong layer of security, but Pheno undermines this by intercepting them before they reach the user. The plugin monitors SMS messages, push notifications, and even authentication app outputs if it gains appropriate permissions. By capturing OTPs moments after they are generated, attackers can use them to complete login attempts before the code expires. This renders MFA ineffective, as the attacker possesses both the credential and the OTP. Organizations relying solely on SMS-based OTPs are especially vulnerable to this technique.

6. Windows Phone Link Exploitation

While details remain limited, researchers suspect that the attack may leverage the Phone Link feature in Windows to intercept SMS-based OTPs. Phone Link allows users to view and respond to messages from an Android device on their PC. By exploiting this integration, CloudZ RAT with Pheno could redirect or copy SMS messages containing OTPs. This vector would be particularly effective if the victim uses a compromised PC that is synced with their smartphone. The hijacking of such cross-platform features highlights the evolving nature of credential theft in modern attacks.

CloudZ RAT and Pheno Plugin: 10 Critical Facts About Credential and OTP Theft
Source: feeds.feedburner.com

7. Cybersecurity Research Findings

Security analysts from an undisclosed firm disclosed the intrusion and the inner workings of the CloudZ RAT and Pheno plugin. Their statement noted: 'According to the functionalities of the CloudZ RAT and Pheno plugin, this was with the intention of stealing victims' credentials and potentially one-time passwords (OTPs).' The research emphasizes the need for greater awareness of plugin-based RATs, as they can be easily customized for specific targets. The findings were presented to industry peers to encourage development of detection rules and defense strategies.

8. Impact on Victims

Affected individuals may face account takeovers, financial theft, and privacy breaches. For businesses, credential theft can lead to data breaches, ransomware deployment, or lateral movement within networks. Because OTPs are intercepted, even accounts with MFA are compromised, expanding the attack surface. Victims may not realize their credentials have been stolen until unauthorized activity occurs. The psychological impact includes loss of trust in digital platforms and increased anxiety over privacy. Long-term consequences often involve costly remediation and reputational damage.

9. Mitigation Strategies

To defend against CloudZ RAT and similar threats, organizations should enforce strict email filtering to block phishing attempts. Multi-factor authentication using hardware tokens or biometrics is less susceptible to OTP interception. Endpoint detection and response (EDR) tools can identify unusual behavior associated with RATs. Regular security awareness training helps users recognize suspicious links and attachments. Additionally, monitoring for unauthorized plugin or DLL injections can catch Pheno-like components early. Keeping systems patched and reviewing Phone Link permissions on Windows devices reduce exploitation risks.

10. Future Threat Landscape

The emergence of specialized plugins like Pheno suggests cybercriminals are investing in modular malicious tools that adapt to target environments. As MFA adoption grows, attackers will seek new ways to circumvent it—OTP interception is just one example. CloudZ RAT's plugin architecture can be expanded with additional modules for keylogging, screen capture, or even audio recording. This flexibility makes it a persistent threat that will likely evolve with countermeasures. Security professionals must stay vigilant and share intelligence to preempt future variations of such attacks.

In conclusion, the CloudZ RAT and Pheno plugin represent a notable escalation in credential and OTP theft techniques. By exploiting common user behaviors and trusted features like Phone Link, attackers have found a potent combination to bypass security defenses. Staying informed, implementing robust security practices, and investing in advanced detection tools are crucial steps to mitigate this threat. Cybersecurity is a continuous battle—awareness is your first line of defense.

Recommended