New wave of cyberattacks by APT group Cloud Atlas on Russia's government sector
The APT group Cloud Atlas has launched a new wave of cyberattacks targeting Russia's defense industry. They are using stolen document templates from previously infected organizations to create malicious Microsoft Office files. The group cleans metadata from these documents to avoid revealing compromised entities. They move between targeted companies using compromised email accounts (BEC attacks). The attacks focus on defense industry enterprises, with malicious documents disguised as invitations, anti-corruption checks, mobilization documents, employee records, and financial statements. Cloud Atlas uses Google Sheets API for data exfiltration and employs the PowerShower backdoor. The group's infrastructure has migrated to new servers and domains, indicating ongoing campaign development.
AI Analysis
Technical Summary
The APT group known as Cloud Atlas has launched a renewed wave of cyberattacks specifically targeting Russia's defense industry. The attackers utilize stolen document templates from previously compromised organizations to craft malicious Microsoft Office files, which are then weaponized to deliver malware. To evade detection and attribution, the group meticulously cleans metadata from these documents, preventing defenders from tracing the source or victim organizations. The initial infection vector involves business email compromise (BEC) attacks, where attackers leverage compromised email accounts to move laterally between targeted companies. The malicious documents are disguised as legitimate and contextually relevant files such as invitations, anti-corruption checks, mobilization documents, employee records, and financial statements, increasing the likelihood of user interaction and successful exploitation. Once executed, the malware deploys the PowerShower backdoor, a known tool associated with Cloud Atlas, enabling persistent access and control over infected systems. For data exfiltration, the group uses the Google Sheets API, a novel method that blends exfiltration traffic with legitimate cloud service usage, complicating detection efforts. The campaign infrastructure has recently migrated to new servers and domains, indicating an ongoing and evolving operation. The attack techniques align with multiple MITRE ATT&CK tactics and techniques, including spear-phishing (T1566), use of legitimate cloud services for command and control and exfiltration (T1102), and credential access via BEC (T1586). Although the campaign currently targets Russian defense enterprises, the sophistication and tactics employed could be adapted against other high-value targets. No known public exploits exist for this threat, and no specific affected software versions are identified, underscoring the threat's reliance on social engineering and operational security rather than software vulnerabilities.
Potential Impact
For European organizations, particularly those in the defense, government, and critical infrastructure sectors, the Cloud Atlas campaign represents a significant risk due to the advanced social engineering and stealthy operational methods employed. While the current focus is on Russian defense entities, European companies with supply chain or collaborative ties to Russian defense or related industries could be indirectly targeted or affected by spillover attacks. The use of compromised email accounts for lateral movement and BEC attacks highlights the risk of credential theft and insider threat vectors, which could lead to unauthorized access, data breaches, and espionage. The deployment of the PowerShower backdoor enables persistent remote access, potentially allowing attackers to conduct long-term surveillance, data theft, or sabotage. Utilizing the Google Sheets API for data exfiltration complicates detection, as traffic may blend with legitimate cloud service usage, increasing the likelihood of data loss without immediate detection. The campaign's evasion techniques, such as metadata cleaning, reduce forensic traceability, hindering incident response and attribution efforts. Overall, the threat could undermine confidentiality and integrity of sensitive information, disrupt operations, and damage national security interests if European defense or governmental entities become targets or collateral victims.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice to counter this threat effectively. First, enhance email security by deploying advanced anti-phishing solutions capable of detecting spear-phishing attempts and analyzing document metadata anomalies. Implement strict multi-factor authentication (MFA) on all email and cloud service accounts to reduce the risk of credential compromise and lateral movement via BEC. Conduct regular user awareness training focused on recognizing sophisticated phishing lures, especially those mimicking official documents like invitations or financial statements. Monitor network traffic for unusual use of cloud APIs, particularly Google Sheets API calls, which may indicate covert data exfiltration. Deploy endpoint detection and response (EDR) tools with capabilities to detect PowerShell-based backdoors like PowerShower, including behavioral analysis of script execution and command patterns. Maintain up-to-date threat intelligence feeds to track infrastructure changes and indicators of compromise related to Cloud Atlas. Conduct regular audits of email account activity and implement anomaly detection to identify unauthorized access or unusual forwarding rules. Finally, establish incident response playbooks tailored to APT tactics involving social engineering and cloud-based exfiltration to enable rapid containment and remediation.
Affected Countries
Russia, Germany, France, United Kingdom, Poland, Italy
Indicators of Compromise
- ip: 193.233.48.245
- ip: 194.87.252.14
- ip: 45.140.169.16
- ip: 45.156.21.167
- domain: officeconfirm.technoguides.org
- hash: 07ca69fd588c02f5424b08e0b832ea26
- hash: 1cf4bd01863f71ac3084ad6ce95995dc
- hash: 38d5515feb663d78c20a5d1a90ee2032
- hash: 3e20d2771e34aa2f468be6c5116ee763
- hash: 555a8caee84a36325e1e9092c603324f
- hash: 72dd2a0a3dd7d86882f952ee4cbbdc47
- hash: 7c26687af337f87fabe8cbfdad040421
- hash: 888a2b33622eafe21aa05ca0a61130af
- hash: 8d9fc934630e22ef50c53772f16335d3
- hash: 8e06f1fb527bc07935d49a25a92724ea
- hash: 991a239c18c74239c9382eaac0cec13f
- hash: 995031782527200f0bbf90567c4f5efc
- hash: a4c5ba083b544c748f2fc3d5539f71f9
- hash: ac872b78dc934d309d2d4fa710858ec6
- hash: b684c32fe323e10840ea1992d08cfa38
- hash: b979cd254b16f4aeb4b5064c6e6550c0
- hash: bd691933cf63c5304adf430248aeed0c
- hash: 05771ef994b1fb1d051cbe2e4b34fcad66d11d8e
- hash: 05a3dc8bcb0b4336d40c71b23b94ebd14f0c3ab0
- hash: 1331e62a9f07a003cb83582c908319f74261b7eb
- hash: 391911332095472c17ac37c26b1734f3d956b5a2
- hash: 4f44476d654d792993406ee5cffb8ff848b60acf
- hash: 549a73c4401c70e7d4bf38b193f4da27ad11b34f
- hash: 5ed9476879cfd52381424958f15e296e40ef6875
- hash: 71df86eba98179c915be5e4665b996fba533e4a6
- hash: 824bb916fd0e9d53bf3211c9e8e76f1c0baaf17f
- hash: 9e8548562836aa1f25fd118638c6bd1b3b36f2e5
- hash: bdce4e6079dd8cc498491165e10189023278f5ec
- hash: bf74b52723665152047568fd675aceb68834c522
- hash: bf9f04945a479acd71dc52f318ef1bc16eee2bf1
- hash: c433621eb7f5a5a3ff5cfb8a16cfcb26011c76b5
- hash: cd47d78392578cfbf7486031ed85cfd3775cb65c
- hash: d503de1acbf93c5b05dcf3722eef2a11b35ea4e0
- hash: da36e4ed73f6cc015a0c631fb313a077ef32873d
- hash: 0806e4661777f2b30b7abc96cdbca56ecde5c5703ee52fe5013d30a41ad5508f
- hash: 132934c4eb40a0a993d43dad94c61288a02c018d0be25340dc23673c9b90fa32
- hash: 2824bbb0c66136d6e9c520af187652b5ed1ac6293362877adc85e714af08e450
- hash: 29c461ee511f828129f91a92dfa0a764dc96ec40041974c6c0d00f36c7523dc8
- hash: 2b1711056233dea4cd8dc8376080f5012765b55e159f90fa407fc016328e88e9
- hash: 46a4389c8bd8f1bf3a39706f62026adaf9792edcf4e5630f3f69bef69ba97ea3
- hash: 505e1531d8902de5d198327e238d4694e2eb28fc4f8c239b0db31f09136dce3d
- hash: 71a7820f325c21d9b69830ba58c73865c878b743ddbe6c3e7121a4c405f165e1
- hash: 7d93e536e30c9af42fb19daf4ab86d74eba9635395e4bcfc54c732003bbed4b4
- hash: 98faf6bbea66f07eba832748059a9d466745ab1d4ab16542a91d610dc2b43829
- hash: b8f06954357e6ad1524d13d3c9ee6b495bcd7e3b04acac8694d2f2408c201278
- hash: be41151fbe79e2eb2593f446155f3728d53bc17d5f3cadd7990115cdba871749
- hash: c9ec38422325e766c0c258995d012946d9a51b12fa9e248336bc9d65a4072384
- hash: d8c056e968bdf6a2692575f43e3c4e8761ead909937ed2e58cf9b3ed2f6f476d
- hash: f200fe00265b1f6de5de045341dd00ed13193c5939a1e143d54d793223368d8d
- hash: f4730051838e9d95280406cd1c24a584597879468e4e7ba6001b29d5fa61db88
- hash: fd5ce13879ef7f09a49ffac501dfc716c2bec96d2ce1041f4e5433a8a0429b6e
- domain: block-monitor.net
- domain: cloud-workstation.com
- domain: cyberservice24.com
New wave of cyberattacks by APT group Cloud Atlas on Russia's government sector
Description
The APT group Cloud Atlas has launched a new wave of cyberattacks targeting Russia's defense industry. They are using stolen document templates from previously infected organizations to create malicious Microsoft Office files. The group cleans metadata from these documents to avoid revealing compromised entities. They move between targeted companies using compromised email accounts (BEC attacks). The attacks focus on defense industry enterprises, with malicious documents disguised as invitations, anti-corruption checks, mobilization documents, employee records, and financial statements. Cloud Atlas uses Google Sheets API for data exfiltration and employs the PowerShower backdoor. The group's infrastructure has migrated to new servers and domains, indicating ongoing campaign development.
AI-Powered Analysis
Technical Analysis
The APT group known as Cloud Atlas has launched a renewed wave of cyberattacks specifically targeting Russia's defense industry. The attackers utilize stolen document templates from previously compromised organizations to craft malicious Microsoft Office files, which are then weaponized to deliver malware. To evade detection and attribution, the group meticulously cleans metadata from these documents, preventing defenders from tracing the source or victim organizations. The initial infection vector involves business email compromise (BEC) attacks, where attackers leverage compromised email accounts to move laterally between targeted companies. The malicious documents are disguised as legitimate and contextually relevant files such as invitations, anti-corruption checks, mobilization documents, employee records, and financial statements, increasing the likelihood of user interaction and successful exploitation. Once executed, the malware deploys the PowerShower backdoor, a known tool associated with Cloud Atlas, enabling persistent access and control over infected systems. For data exfiltration, the group uses the Google Sheets API, a novel method that blends exfiltration traffic with legitimate cloud service usage, complicating detection efforts. The campaign infrastructure has recently migrated to new servers and domains, indicating an ongoing and evolving operation. The attack techniques align with multiple MITRE ATT&CK tactics and techniques, including spear-phishing (T1566), use of legitimate cloud services for command and control and exfiltration (T1102), and credential access via BEC (T1586). Although the campaign currently targets Russian defense enterprises, the sophistication and tactics employed could be adapted against other high-value targets. No known public exploits exist for this threat, and no specific affected software versions are identified, underscoring the threat's reliance on social engineering and operational security rather than software vulnerabilities.
Potential Impact
For European organizations, particularly those in the defense, government, and critical infrastructure sectors, the Cloud Atlas campaign represents a significant risk due to the advanced social engineering and stealthy operational methods employed. While the current focus is on Russian defense entities, European companies with supply chain or collaborative ties to Russian defense or related industries could be indirectly targeted or affected by spillover attacks. The use of compromised email accounts for lateral movement and BEC attacks highlights the risk of credential theft and insider threat vectors, which could lead to unauthorized access, data breaches, and espionage. The deployment of the PowerShower backdoor enables persistent remote access, potentially allowing attackers to conduct long-term surveillance, data theft, or sabotage. Utilizing the Google Sheets API for data exfiltration complicates detection, as traffic may blend with legitimate cloud service usage, increasing the likelihood of data loss without immediate detection. The campaign's evasion techniques, such as metadata cleaning, reduce forensic traceability, hindering incident response and attribution efforts. Overall, the threat could undermine confidentiality and integrity of sensitive information, disrupt operations, and damage national security interests if European defense or governmental entities become targets or collateral victims.
Mitigation Recommendations
European organizations should implement targeted mitigations beyond generic advice to counter this threat effectively. First, enhance email security by deploying advanced anti-phishing solutions capable of detecting spear-phishing attempts and analyzing document metadata anomalies. Implement strict multi-factor authentication (MFA) on all email and cloud service accounts to reduce the risk of credential compromise and lateral movement via BEC. Conduct regular user awareness training focused on recognizing sophisticated phishing lures, especially those mimicking official documents like invitations or financial statements. Monitor network traffic for unusual use of cloud APIs, particularly Google Sheets API calls, which may indicate covert data exfiltration. Deploy endpoint detection and response (EDR) tools with capabilities to detect PowerShell-based backdoors like PowerShower, including behavioral analysis of script execution and command patterns. Maintain up-to-date threat intelligence feeds to track infrastructure changes and indicators of compromise related to Cloud Atlas. Conduct regular audits of email account activity and implement anomaly detection to identify unauthorized access or unusual forwarding rules. Finally, establish incident response playbooks tailored to APT tactics involving social engineering and cloud-based exfiltration to enable rapid containment and remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.ptsecurity.com/research/pt-esc-threat-intelligence/novaya-volna-kiberatak-apt-gruppirovki-cloud-atlas-na-gosudarstvennyj-sektor-rossii/"]
- Adversary
- Cloud Atlas
- Pulse Id
- 69048295b869934bfccecceb
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip193.233.48.245 | — | |
ip194.87.252.14 | — | |
ip45.140.169.16 | — | |
ip45.156.21.167 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainofficeconfirm.technoguides.org | — | |
domainblock-monitor.net | — | |
domaincloud-workstation.com | — | |
domaincyberservice24.com | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash07ca69fd588c02f5424b08e0b832ea26 | — | |
hash1cf4bd01863f71ac3084ad6ce95995dc | — | |
hash38d5515feb663d78c20a5d1a90ee2032 | — | |
hash3e20d2771e34aa2f468be6c5116ee763 | — | |
hash555a8caee84a36325e1e9092c603324f | — | |
hash72dd2a0a3dd7d86882f952ee4cbbdc47 | — | |
hash7c26687af337f87fabe8cbfdad040421 | — | |
hash888a2b33622eafe21aa05ca0a61130af | — | |
hash8d9fc934630e22ef50c53772f16335d3 | — | |
hash8e06f1fb527bc07935d49a25a92724ea | — | |
hash991a239c18c74239c9382eaac0cec13f | — | |
hash995031782527200f0bbf90567c4f5efc | — | |
hasha4c5ba083b544c748f2fc3d5539f71f9 | — | |
hashac872b78dc934d309d2d4fa710858ec6 | — | |
hashb684c32fe323e10840ea1992d08cfa38 | — | |
hashb979cd254b16f4aeb4b5064c6e6550c0 | — | |
hashbd691933cf63c5304adf430248aeed0c | — | |
hash05771ef994b1fb1d051cbe2e4b34fcad66d11d8e | — | |
hash05a3dc8bcb0b4336d40c71b23b94ebd14f0c3ab0 | — | |
hash1331e62a9f07a003cb83582c908319f74261b7eb | — | |
hash391911332095472c17ac37c26b1734f3d956b5a2 | — | |
hash4f44476d654d792993406ee5cffb8ff848b60acf | — | |
hash549a73c4401c70e7d4bf38b193f4da27ad11b34f | — | |
hash5ed9476879cfd52381424958f15e296e40ef6875 | — | |
hash71df86eba98179c915be5e4665b996fba533e4a6 | — | |
hash824bb916fd0e9d53bf3211c9e8e76f1c0baaf17f | — | |
hash9e8548562836aa1f25fd118638c6bd1b3b36f2e5 | — | |
hashbdce4e6079dd8cc498491165e10189023278f5ec | — | |
hashbf74b52723665152047568fd675aceb68834c522 | — | |
hashbf9f04945a479acd71dc52f318ef1bc16eee2bf1 | — | |
hashc433621eb7f5a5a3ff5cfb8a16cfcb26011c76b5 | — | |
hashcd47d78392578cfbf7486031ed85cfd3775cb65c | — | |
hashd503de1acbf93c5b05dcf3722eef2a11b35ea4e0 | — | |
hashda36e4ed73f6cc015a0c631fb313a077ef32873d | — | |
hash0806e4661777f2b30b7abc96cdbca56ecde5c5703ee52fe5013d30a41ad5508f | — | |
hash132934c4eb40a0a993d43dad94c61288a02c018d0be25340dc23673c9b90fa32 | — | |
hash2824bbb0c66136d6e9c520af187652b5ed1ac6293362877adc85e714af08e450 | — | |
hash29c461ee511f828129f91a92dfa0a764dc96ec40041974c6c0d00f36c7523dc8 | — | |
hash2b1711056233dea4cd8dc8376080f5012765b55e159f90fa407fc016328e88e9 | — | |
hash46a4389c8bd8f1bf3a39706f62026adaf9792edcf4e5630f3f69bef69ba97ea3 | — | |
hash505e1531d8902de5d198327e238d4694e2eb28fc4f8c239b0db31f09136dce3d | — | |
hash71a7820f325c21d9b69830ba58c73865c878b743ddbe6c3e7121a4c405f165e1 | — | |
hash7d93e536e30c9af42fb19daf4ab86d74eba9635395e4bcfc54c732003bbed4b4 | — | |
hash98faf6bbea66f07eba832748059a9d466745ab1d4ab16542a91d610dc2b43829 | — | |
hashb8f06954357e6ad1524d13d3c9ee6b495bcd7e3b04acac8694d2f2408c201278 | — | |
hashbe41151fbe79e2eb2593f446155f3728d53bc17d5f3cadd7990115cdba871749 | — | |
hashc9ec38422325e766c0c258995d012946d9a51b12fa9e248336bc9d65a4072384 | — | |
hashd8c056e968bdf6a2692575f43e3c4e8761ead909937ed2e58cf9b3ed2f6f476d | — | |
hashf200fe00265b1f6de5de045341dd00ed13193c5939a1e143d54d793223368d8d | — | |
hashf4730051838e9d95280406cd1c24a584597879468e4e7ba6001b29d5fa61db88 | — | |
hashfd5ce13879ef7f09a49ffac501dfc716c2bec96d2ce1041f4e5433a8a0429b6e | — |
Threat ID: 69049c46479ed964d8e04a03
Added to database: 10/31/2025, 11:23:50 AM
Last enriched: 10/31/2025, 11:24:54 AM
Last updated: 12/15/2025, 12:07:51 PM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery
MediumThreatFox IOCs for 2025-12-14
MediumThreatFox IOCs for 2025-12-13
MediumOffline Decryption Messenger: Concept Proposal and Request for Constructive Feedback
MediumFake Microsoft Teams and Google Meet Downloads Spread Oyster Backdoor
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.