April 17, 2026
By esentry Team

Trusted Cloud, Hidden Threat

What happens when attackers stop building shady websites and start hiding in plain sight?

Cybercriminals are now abusing Google Cloud Storage, one of the most trusted platforms on the internet to bypass email security controls and silently deliver Remcos RAT, a powerful remote access trojan.

Instead of registering suspicious domains that trigger reputation‑based defenses, attackers are using storage.googleapis.com, a legitimate Google Cloud domain, to host phishing pages and malware delivery infrastructure.

  • The result?
  • Email filters are bypassed
  • Reputation checks pass
  • Web security tools stay quiet

This campaign highlights a growing reality: trusted cloud platforms can no longer be trusted by default.

How the Attack Starts

The campaign begins with phishing emails that link directly to pages hosted on Google Cloud Storage, typically under storage.googleapis.com.

These pages:

  • Closely mimic Google Drive login screens
  • Display familiar Google branding and icons
  • Advertise fake PDFs, Docs, Sheets, or Slides

Victims are instructed to “sign in to view a document”, unaware the page exists solely to harvest:

  • Email addresses
  • Passwords
  • One‑time passcodes (OTP)

Once credentials are captured, the attack escalates.

The Infection Entry Point

After the fake login step, victims are prompted to download a file named:

Bid-P-INV-Document.js

This JavaScript file is the true payload launcher, and the gateway into a multi‑stage malware infection chain.

Campaign Attribution & Hosting Abuse

Attackers hosted malicious pages on Google‑associated subdomains such as:

  • pa-bids
  • com-bid
  • contract-bid-0
  • out-bid

By “parking” their infrastructure inside Google’s ecosystem, attackers gained natural immunity from reputationbased email and web filtering systems, dramatically increasing success rates.

MultiStage Infection Chain

This attack is carefully layered to evade detection at every step.

JavaScript Execution

  • Runs via Windows Script Host
  • Uses timedelay logic to evade sandboxes with short execution windows

Visual Basic Script (VBS)

  • A hidden VBS stage is launched
  • Downloads and executes an additional VBS payload
  • Drops files into:
  • %APPDATA%\WindowsUpdate
  • Establishes persistence via Startup configuration

PowerShell Loader

  • Executes DYHVQ.ps1
  • Loads an obfuscated executable (ZIFDG.tmp)
  • Fetches an obfuscated .NET loader from Textbin, a public text‑hosting service

InMemory Execution

  • The .NET loader is loaded directly into memory using Assembly.Load
  • Leaves no file artifacts on disk
  • Bypasses most signature‑based antivirus tools

LivingofftheLand Injection

  • Abuses RegSvcs.exe, a Microsoft‑signed binary
  • Uses process hollowing to inject the final payload: Remcos RAT

Because RegSvcs.exe has a clean reputation on VirusTotal, this activity often appears benign without behavioral monitoring.

Final Payload: Remcos RAT

Once installed, Remcos RAT provides attackers with full, persistent control over the infected endpoint.

Capabilities include:

  • Keystroke logging
  • Credential theft from browsers and password managers
  • Screenshot capture
  • Webcam and microphone access
  • Clipboard monitoring
  • Remote file transfer and command execution

Persistence is established via:

HKEY_CURRENT_USER\Software\Remcos-{ID}

A single infected system can rapidly become a launchpad for ransomware, data exfiltration, and lateral movement across enterprise networks.

Why This Threat Is Especially Dangerous

This campaign creates a dualrisk scenario:

Immediate credential compromise (Google accounts, corporate identities)

Longterm covert surveillance through remote access malware

That combination allows attackers not only to access accounts, but to quietly observe and expand their presence inside the environment overtime.

Recommended Actions:

Treat storage.googleapis.com links with the same scrutiny as unknown domains

Deploy behaviorbased endpoint detection rather than relying on signatures alone

Monitor for:  

  • JavaScript → VBS → PowerShell execution chains
  • Abuse of RegSvcs.exe or other signed LOLBins

Train users especially in finance, procurement, and executive roles to recognize cloud‑storage phishing lures

Never run JavaScript or script files directly on production systems

Trust the signal, not the platform. And assume every cloud‑hosted link can be hostile.