{"id":19993,"date":"2026-04-14T11:04:16","date_gmt":"2026-04-14T11:04:16","guid":{"rendered":"https:\/\/any.run\/cybersecurity-blog\/?p=19993"},"modified":"2026-04-14T11:04:17","modified_gmt":"2026-04-14T11:04:17","slug":"phishing-google-drive-remcos","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/","title":{"rendered":"When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying\u00a0Remcos\u00a0RAT"},"content":{"rendered":"\n<p>Modern phishing campaigns increasingly abuse legitimate services. Cloud platforms, file-sharing tools, trusted domains, and widely used SaaS applications are now part of the attacker\u2019s toolkit. Instead of breaking trust, attackers borrow it.&nbsp;<\/p>\n\n\n\n<p>This shift creates&nbsp;a dangerous&nbsp;asymmetry. Security controls often whitelist or inherently trust these services, while users are far less likely to question them. The result is a smoother path from inbox to infection.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Takeaways&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attackers are shifting to trusted cloud infrastructure (Google Storage) to bypass email filters and reputation checks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The multi-stage chain uses obfuscated JS\/VBS\/PowerShell and legitimate RegSvcs.exe for process injection, making static detection ineffective.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Remcos&nbsp;RAT provides full remote control, keylogging, and data exfiltration \u2014 turning one compromised endpoint into a persistent foothold.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Credential harvesting combined with malware delivery creates dual risk: immediate data theft plus long-term network compromise.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Traditional EDR relying on file reputation misses these attacks; behavioral sandboxing and real-time TI are&nbsp;required.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ANY.RUN\u2019s&nbsp;<a href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktoenterprise\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox, TI Lookup, and TI Feeds<\/a>&nbsp;enable&nbsp;proactive detection and rapid response, closing the gap before damage occurs.&nbsp;<br>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">The New Face of Phishing: When \u201cLegitimate\u201d Becomes Lethal&nbsp;<\/h2>\n\n\n\n<p>According to ANY.RUN&#8217;s annual&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/malware-trends-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Malware Trends Report<\/a>&nbsp;for 2025,&nbsp;phishing driven by multi-stage redirect chains and trusted-cloud hosting has become the dominant attack vector, with&nbsp;<a href=\"https:\/\/any.run\/malware-trends\/rat\/\" target=\"_blank\" rel=\"noreferrer noopener\">RATs<\/a>&nbsp;and backdoors rising 28% and&nbsp;68%&nbsp;respectively. The abuse of legitimate platforms has made traditional reputation-based filtering fundamentally unreliable.&nbsp;<\/p>\n\n\n\n<p>Early detection is no longer simply a technical performance metric. It is a business continuity imperative. When threats hide inside trusted infrastructure, the window between&nbsp;initial&nbsp;infection and serious organizational impact can be measured in hours, not days. Security teams that cannot&nbsp;identify&nbsp;and&nbsp;contain&nbsp;an attack in its earliest stages \u2014 before the payload executes, before the C2 channel&nbsp;is&nbsp;established, before the attacker pivots deeper into the network \u2014 face an exponentially harder response challenge.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing Campaign Hiding&nbsp;Remcos&nbsp;RAT Inside Google Cloud Storage&nbsp;<\/h2>\n\n\n\n<p>In April 2026, ANY.RUN\u2019s threat research team&nbsp;identified&nbsp;a sophisticated multi-stage phishing campaign that perfectly exemplifies this new breed of attack. The campaign abuses Google Cloud Storage to host HTML phishing pages themed as Google Drive document viewers,&nbsp;ultimately delivering&nbsp;the&nbsp;Remcos&nbsp;Remote Access Trojan (RAT).&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/0efd1390-c17a-49ce-baef-44b5bd9c4a97\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View the attack in&nbsp;real&nbsp;time in a live sandbox session<\/a>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"486\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_2-1024x486.png\" alt=\"\" class=\"wp-image-20004\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_2-1024x486.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_2-300x142.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_2-768x365.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_2-1536x729.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_2-370x176.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_2-270x128.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_2-740x351.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_2.png 1841w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Sandbox analysis of&nbsp;a&nbsp;phishing attack<\/em>&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>The attackers&nbsp;parked&nbsp;their phishing pages on a legitimate,&nbsp;widely-trusted&nbsp;Google domain. This single architectural choice allowed the campaign to bypass a wide range of conventional email security gateways and web filtering tools.&nbsp;<br>&nbsp;<br>Convincing Google Drive-themed phishing pages are hosted on storage.googleapis.com subdomains such as pa-bids, com-bid, contract-bid-0, in-bids, and out-bid. Examples include URLs like&nbsp;hxxps:\/\/storage[.]googleapis[.]com\/com-bid\/GoogleDrive.html. These pages mimic legitimate Google Workspace sign-in flows, complete with branded logos, file-type icons (PDF, DOC, SHEET, SLIDE), and prompts to \u201c<em>Sign in to view document in Google Drive<\/em>.\u201d&nbsp;<br>&nbsp;<br>The pages are crafted to harvest full account credentials: email address, password, and one-time passcode. But&nbsp;the credential&nbsp;theft is just the opening act.&nbsp;After&nbsp;a&nbsp;\u201csuccessful login,\u201d the page prompts the download of a file named Bid-Packet-INV-Document.js, which serves as the entry point for the malware delivery chain.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attack Chain&nbsp;<\/h3>\n\n\n\n<p>The delivery chain is deliberately complex and layered to evade detection at every stage:&nbsp;<\/p>\n\n\n\n<p><strong>1. Phishing Email Delivery<\/strong>.&nbsp;Because the sending domain and the linked domain are both associated with legitimate Google infrastructure, the email passes standard DMARC, SPF, and DKIM authentication checks, and is not flagged by reputation-based email filters.&nbsp;<\/p>\n\n\n\n<p><strong>2. Fake Google Drive Login Page<\/strong>.&nbsp;The googleapis.com link opens a convincing replica of the Google Drive interface, prompting the victim to authenticate with their email address, password, and one-time passcode. Credentials entered here are captured and exfiltrated to the attacker&#8217;s command-and-control infrastructure.&nbsp;<\/p>\n\n\n\n<p><strong>3.&nbsp;Malicious JavaScript Download<\/strong>. The victim is prompted to download Bid-Packet-INV-Document.js, presented as a business document. When executed under Windows Script Host, this JavaScript file&nbsp;contains&nbsp;time-based evasion logic \u2014 it can delay execution to avoid sandbox detection environments that analyze behavior within a fixed time window.&nbsp;<\/p>\n\n\n\n<p><strong>4.&nbsp;VBS Chain and Persistence<\/strong>.&nbsp;The JavaScript launches a first VBS stage, which downloads and silently executes a second VBS file. This second stage drops components into %APPDATA%\\WindowsUpdate&nbsp;(folder name chosen to blend in with legitimate Windows processes)&nbsp;and configures Startup persistence, ensuring the malware survives system reboots.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"714\" height=\"798\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_3.png\" alt=\"\" class=\"wp-image-20006\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_3.png 714w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_3-268x300.png 268w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_3-370x414.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_3-270x302.png 270w\" sizes=\"(max-width: 714px) 100vw, 714px\" \/><figcaption class=\"wp-element-caption\"><em>Malicious script activity captured by the sandbox<\/em>&nbsp;<\/figcaption><\/figure>\n\n\n\n<p><strong>5.&nbsp;PowerShell Orchestration<\/strong>.&nbsp;A PowerShell script (DYHVQ.ps1) then orchestrates the loading of an obfuscated portable executable stored as&nbsp;ZIFDG.tmp, which&nbsp;contains&nbsp;the&nbsp;Remcos&nbsp;RAT payload. To remain stealthy, the chain simultaneously fetches an&nbsp;additional&nbsp;obfuscated .NET loader from&nbsp;Textbin, a text-hosting service,&nbsp;loading it directly in memory via&nbsp;Assembly.Load, leaving no file on disk for traditional antivirus engines to scan.&nbsp;<\/p>\n\n\n\n<p><strong>6.&nbsp;Process Hollowing via RegSvcs.exe<\/strong>.&nbsp;The .NET loader abuses RegSvcs.exe&nbsp;for&nbsp;process hollowing. Because RegSvcs.exe is signed by Microsoft and carries a clean reputation on&nbsp;VirusTotal, its execution&nbsp;appears&nbsp;benign in endpoint logs. The loader creates or starts RegSvcs.exe from %TEMP%, hollowing the process and injecting the&nbsp;Remcos&nbsp;payload into its memory space. The result is a partially fileless&nbsp;Remcos&nbsp;instance: most of the malicious logic executes entirely in memory, never touching the disk in a form that a signature-based scanner would recognize.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"825\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_4.png\" alt=\"\" class=\"wp-image-20009\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_4.png 709w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_4-258x300.png 258w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_4-370x431.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_4-270x314.png 270w\" sizes=\"(max-width: 709px) 100vw, 709px\" \/><figcaption class=\"wp-element-caption\"><em>Remcos&nbsp;RAT detected in the sandbox analysis<\/em><\/figcaption><\/figure>\n\n\n\n<p><strong>7.&nbsp;C2 Establishment<\/strong>.&nbsp;Remcos&nbsp;establishes an encrypted communication channel back to the attacker&#8217;s command-and-control server and writes persistence entries into the Windows Registry under HKEY_CURRENT_USER\\Software\\Remcos-{ID}, ensuring continued access across reboots. From this point, the attacker has full, persistent, covert control over the compromised endpoint.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/features\/?utm_source=mtt&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktosandboxanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s sandbox<\/a>&nbsp;analysis clearly visualizes this chain: wscript.exe spawns multiple VBS and JS scripts, cmd.exe and powershell.exe handle staging, and RegSvcs.exe is flagged for&nbsp;Remcos&nbsp;behavior. The entire process tree&nbsp;demonstrates&nbsp;how attackers chain living-off-the-land binaries (LOLBins) with obfuscation and in-memory execution.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why This Attack Works \u2014 and Why&nbsp;Remcos&nbsp;Makes It So Dangerous&nbsp;<\/h2>\n\n\n\n<p>The attack succeeds because it weaponizes trust&nbsp;at&nbsp;every layer. Google Storage provides reputation immunity. RegSvcs.exe is a signed Microsoft binary used for .NET service installation: its clean hash means endpoint protection rarely flags it. Combined with heavy obfuscation, time-based evasion, and fileless techniques, the campaign slips past static analysis and many EDR rules that rely on file reputation or known malicious domains.&nbsp;<\/p>\n\n\n\n<p>At the heart of the final payload is&nbsp;<a href=\"https:\/\/any.run\/malware-trends\/remcos\/\" target=\"_blank\" rel=\"noreferrer noopener\">Remcos RAT<\/a>&nbsp;\u2014 a commercially available Remote Access Trojan that has become a favorite among cybercriminals due to its affordability, ease of use, and powerful feature set.&nbsp;It&nbsp;grants attackers full remote control over the compromised system. Capabilities include keylogging, credential harvesting from browsers and password managers, screenshot capture, file upload\/download, remote command execution, microphone and webcam access, and clipboard monitoring. It supports persistence mechanisms, anti-analysis tricks, and encrypted C2 communication.&nbsp;<\/p>\n\n\n\n<p>The dangers of&nbsp;Remcos&nbsp;extend far beyond&nbsp;initial&nbsp;access. It serves as a beachhead for further attacks: ransomware deployment, lateral movement across the corporate network, data exfiltration of intellectual property or customer records, and even supply-chain compromise if the infected machine belongs to a vendor. Because it runs in memory inside a trusted process, it can remain undetected for weeks or months, silently harvesting sensitive data.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why&nbsp;This&nbsp;Matters for&nbsp;Businesses&nbsp;<\/h2>\n\n\n\n<p>Enterprises face amplified risk because these campaigns target high-value users&nbsp;(executives, finance teams, and procurement staff)&nbsp;who routinely handle sensitive documents and have elevated privileges. A single successful infection can lead to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data Breaches and Regulatory Fines<\/strong>: Stolen credentials and exfiltrated files can trigger GDPR, CCPA, or industry-specific compliance violations costing millions.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Financial Losses<\/strong>: Direct wire fraud from compromised email accounts or indirect losses from ransomware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Operational Disruption<\/strong>: Lateral movement can encrypt servers or exfiltrate intellectual property, halting&nbsp;production&nbsp;or R&amp;D.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reputation Damage<\/strong>: Clients and partners lose trust when a breach is publicly&nbsp;disclosed.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Supply-Chain Ripple Effects<\/strong>: If a&nbsp;vendor\u2019s&nbsp;system is compromised via this vector, attackers can pivot into larger organizations.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>In attacks that exploit legitimate services, the Mean Time to Detect (<a href=\"https:\/\/any.run\/cybersecurity-blog\/reduce-mttd-with-ti-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">MTTD<\/a>) for conventional security tools is dramatically extended. When the&nbsp;initial&nbsp;link is clean, the host domain is trusted, and the payload runs inside a legitimate Microsoft process, the&nbsp;alert chain that&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/60-seconds-phishing-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">SOC teams<\/a>&nbsp;depend on generates few or no signals. The attacker&nbsp;operates&nbsp;in silence while gathering intelligence, escalating privileges, and expanding their foothold.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Enabling Proactive Protection Against Trust-Abuse Phishing&nbsp;<\/h2>\n\n\n\n<p>Defending against phishing campaigns that abuse legitimate services requires a security capability that&nbsp;operates&nbsp;at the behavioral level \u2014 one that can&nbsp;observe&nbsp;what happens after a link is clicked or a file is opened, not just assess whether a URL or hash matches a known-bad list.&nbsp;<a href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktoenterprise\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN&#8217;s Enterprise Suite<\/a>&nbsp;is&nbsp;built precisely for this purpose, and its three core modules address the threat at complementary stages of the detection and response lifecycle.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Triage &amp; Response: See the Full Kill Chain Before It Reaches Production&nbsp;<\/h3>\n\n\n\n<p>The foundation of ANY.RUN&#8217;s detection capability is its&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=mtt&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktosandboxanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>: a cloud-based, fully interactive analysis environment that allows security analysts to safely detonate suspicious files and URLs in real time. Unlike automated sandboxes that analyze behavior passively within a fixed time window, ANY.RUN&#8217;s sandbox supports genuine human interaction: analysts can click, type, scroll, and navigate within the isolated virtual machine, triggering behavior that might be blocked by time-delay evasion or anti-automation logic.&nbsp;<\/p>\n\n\n\n<p>In the Google Cloud Storage \/&nbsp;Remcos&nbsp;campaign, this capability is decisive. The malicious JavaScript embedded time-based evasion logic is&nbsp;a mechanism designed specifically to defeat automated sandbox analysis. An interactive sandbox can wait out that delay, manually trigger the next stage, and&nbsp;observe&nbsp;the complete execution chain from the&nbsp;initial&nbsp;JS download through the VBS stages, the PowerShell orchestration, the process hollowing via RegSvcs.exe, and the final&nbsp;Remcos&nbsp;C2 callback.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n<span class=\"highlight\"> Reduce <\/span> the risk of delayed detection\n<br>Help your team <span class=\"highlight\">investigate faster<\/span>  and respond earlier\n&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=phishing-google-drive-remcos&#038;utm_term=140426&#038;utm_content=linktoregistration\" rel=\"noopener\" target=\"_blank\">\nPower up your SOC\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>The result is not just a verdict but a full behavioral map: every process spawned, every network connection&nbsp;initiated, every registry key written, every file dropped. This map translates directly into actionable detection logic \u2014&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/mitre-ttps-in-ti-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ATT&amp;CK-mapped TTPs<\/a>,&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/ai-sigma-rules\/\" target=\"_blank\" rel=\"noreferrer noopener\">Sigma rules<\/a>&nbsp;that can be deployed to SIEM and EDR platforms, and concrete IOCs that can be operationalized across the security stack.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"676\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_5-1024x676.png\" alt=\"\" class=\"wp-image-20013\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_5-1024x676.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_5-300x198.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_5-768x507.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_5-370x244.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_5-270x178.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_5-740x488.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_5.png 1159w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>MITRE ATT&amp;CK matrix of the attack analyzed in the sandbox<\/em><\/figcaption><\/figure>\n\n\n\n<p>For SOC teams, this means the difference between seeing an alert that says &#8216;suspicious JavaScript file&#8217; and understanding the complete threat: this is&nbsp;Remcos&nbsp;RAT, delivered via process hollowing, with these C2 addresses, using these persistence mechanisms, and these are the detection rules that will catch the next variant.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Threat&nbsp;Hunting: Enrich, Pivot, and Hunt Proactively&nbsp;<\/h3>\n\n\n\n<p>ANY.RUN&#8217;s&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>&nbsp;is a searchable, continuously updated database of threat intelligence drawn from real-time malware analysis conducted by a community of over 600,000 cybersecurity professionals and 15,000 organizations worldwide. It functions as a force multiplier for&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/cyber-threat-hunting-tips\/\" target=\"_blank\" rel=\"noreferrer noopener\">threat hunting<\/a>&nbsp;and incident response, providing instant enrichment for any indicator \u2014 IP address, domain, file hash, URL, or behavioral signature.&nbsp;<\/p>\n\n\n\n<p>In the context of the Google Cloud Storage \/&nbsp;Remcos&nbsp;campaign, Threat Intelligence Lookup enables analysts to move rapidly from a single observed indicator to a comprehensive understanding of the campaign&#8217;s scope. A C2 IP address flagged by sandbox analysis can be pivoted to reveal all associated&nbsp;Remcos&nbsp;samples in the&nbsp;database, the infrastructure pattern used across the campaign, related file hashes, and behavioral indicators that might be present in other systems.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktolookup\/#%7B%2522query%2522:%2522destinationIP:%255C%2522198.187.29.19%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">destinationIP:&#8221;198.187.29.19&#8243;<\/a>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_6-1024x576.png\" alt=\"\" class=\"wp-image-20014\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_6-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_6-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_6-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_6-1536x865.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_6-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_6-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_6-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_6.png 1556w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Domain associated with Google Cloud Storage\/Remcos&nbsp;campaign in TI Lookup<\/em>&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>This pivoting capability is particularly valuable for detecting multi-stage attacks where the initial indicators are clean (a googleapis.com URL, a signed Microsoft binary) but later-stage indicators \u2014 C2 domains, specific PowerShell script signatures, anomalous RegSvcs.exe activity \u2014 can be correlated against historical data to confirm campaign attribution and expand detection coverage.&nbsp;<\/p>\n\n\n\n<p>For threat hunters, Threat Intelligence Lookup supports proactive campaign identification before an organization is impacted.&nbsp;<a href=\"https:\/\/intelligence.any.run\/analysis\/yara?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">YARA-based searches<\/a>, combined with industry and geography filters,&nbsp;allow&nbsp;security teams to&nbsp;identify whether active campaigns are targeting their specific sector and region and to build detection rules based on real-world attacker behavior rather than theoretical models.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Monitoring: Automated, Continuous, Real-World Coverage&nbsp;<\/h3>\n\n\n\n<p>ANY.RUN&#8217;s&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>&nbsp;deliver&nbsp;a continuous stream of fresh, verified malicious indicators directly into an organization&#8217;s security infrastructure \u2014 SIEM, SOAR, TIP, XDR \u2014 via STIX\/TAXII and API\/SDK&nbsp;<a href=\"https:\/\/any.run\/integrations\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktointegrations\" target=\"_blank\" rel=\"noreferrer noopener\">integrations<\/a>. These feeds are generated from live sandbox analysis across the ANY.RUN community, meaning they reflect actual attacker behavior&nbsp;observed&nbsp;in real-world campaigns, not synthetic or retrospectively compiled threat data.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"463\" src=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_7-1024x463.png\" alt=\"\" class=\"wp-image-20017\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_7-1024x463.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_7-300x136.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_7-768x348.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_7-370x167.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_7-270x122.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_7-740x335.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2026\/04\/googleremcos_7.png 1467w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Feeds benefits and integrations<\/em><\/figcaption><\/figure>\n\n\n\n<p>A critical differentiator is the uniqueness rate: ANY.RUN reports that 99% of indicators in its feeds are unique to the platform,&nbsp;not duplicated from public threat intel sources.&nbsp;The feeds also dramatically reduce Tier 1 analyst workload by providing malicious-only alerts with full behavioral context, cutting through the alert fatigue that plagues security operations teams dealing with high volumes of false positives from tools that cannot distinguish between legitimate googleapis.com traffic and the specific pattern of googleapis.com traffic used in this campaign.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n<span class=\"highlight\">99%\u00a0unique <\/span> threat intel for your SOC\n<br>Catch threats\u00a0early. Act with <span class=\"highlight\">clear\u00a0evidence.<\/span>\n&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=phishing-google-drive-remcos&#038;utm_term=140426&#038;utm_content=linktoenterprise#contact-sales\" rel=\"noopener\" target=\"_blank\">\nPower your SOC now\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion&nbsp;<\/h2>\n\n\n\n<p>The Google Storage phishing campaign delivering&nbsp;Remcos&nbsp;RAT is a wake-up call. As attackers continue to abuse trusted cloud services and legitimate binaries, organizations can no longer rely on reputation or signatures alone. Early detection through behavioral analysis and proactive threat intelligence is no longer optional \u2014 it is essential for survival.&nbsp;<\/p>\n\n\n\n<p>By&nbsp;leveraging&nbsp;<a href=\"https:\/\/any.run\/enterprise\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-google-drive-remcos&amp;utm_term=140426&amp;utm_content=linktoenterprise\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Enterprise Suite<\/a>, security leaders can stay ahead of these evolving threats, protect critical assets, and&nbsp;maintain&nbsp;business continuity in an increasingly hostile digital landscape. The time to strengthen defenses is now \u2014 before the next bid document lands in your inbox.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.&nbsp;&nbsp;<\/p>\n\n\n\n<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in an&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktosandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>, enrich indicators with immediate context through&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, and&nbsp;monitor&nbsp;emerging malicious infrastructure using&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the SOC.&nbsp;&nbsp;<\/p>\n\n\n\n<p>ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is&nbsp;<a href=\"https:\/\/any.run\/compliance\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=german-industries-attack-cases&amp;utm_term=090426&amp;utm_content=linktocompliance\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2 Type II certified<\/a>,&nbsp;demonstrating&nbsp;its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">FAQ<\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1776161852940\"><strong class=\"schema-faq-question\">What makes this Google Storage phishing campaign different from traditional attacks?<\/strong> <p class=\"schema-faq-answer\">It hosts the phishing page on legitimate storage.googleapis.com domains instead of suspicious new sites, bypassing URL reputation filters entirely.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776164580742\"><strong class=\"schema-faq-question\">How does the attack ultimately deliver Remcos RAT?<\/strong> <p class=\"schema-faq-answer\">Through a layered chain of JS, VBS, PowerShell, and in-memory loading that culminates in process hollowing of the trusted RegSvcs.exe binary.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776164588178\"><strong class=\"schema-faq-question\">Why is RegSvcs.exe particularly dangerous in this context?<\/strong> <p class=\"schema-faq-answer\">It is a signed Microsoft .NET binary with a clean VirusTotal reputation, allowing attackers to inject the Remcos payload without triggering file-based alerts.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776164599634\"><strong class=\"schema-faq-question\">What capabilities does Remcos RAT provide to attackers?<\/strong> <p class=\"schema-faq-answer\">Full remote access, keylogging, credential theft, file exfiltration, screenshot capture, and persistence \u2014 all while running inside legitimate processes.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776164614153\"><strong class=\"schema-faq-question\">How can ANY.RUN\u2019s sandbox help my team detect similar threats?<\/strong> <p class=\"schema-faq-answer\">It detonates suspicious files\/URLs in a safe environment, reveals the complete behavioral chain, and provides IOCs and process trees for immediate response.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776164624442\"><strong class=\"schema-faq-question\">What should businesses do immediately to protect against these attacks?<\/strong> <p class=\"schema-faq-answer\">Enable behavioral analysis tools, integrate real-time threat intelligence feeds, train staff on cloud-storage lures, and test suspicious links in an interactive sandbox before opening.<\/p> <\/div> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Modern phishing campaigns increasingly abuse legitimate services. Cloud platforms, file-sharing tools, trusted domains, and widely used SaaS applications are now part of the attacker\u2019s toolkit. Instead of breaking trust, attackers borrow it.&nbsp; This shift creates&nbsp;a dangerous&nbsp;asymmetry. Security controls often whitelist or inherently trust these services, while users are far less likely to question them. The [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":19996,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34,40,63,51],"class_list":["post-19993","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior","tag-phishing","tag-rat"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Google Cloud Phishing Drops Remcos RAT<\/title>\n<meta name=\"description\" content=\"ANY.RUN uncovers a Google Cloud Storage phishing campaign delivering Remcos RAT. See the attack chain and how to protect your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying\u00a0Remcos\u00a0RAT\",\"datePublished\":\"2026-04-14T11:04:16+00:00\",\"dateModified\":\"2026-04-14T11:04:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/\"},\"wordCount\":2845,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\",\"phishing\",\"RAT\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#respond\"]}]},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/\",\"name\":\"Google Cloud Phishing Drops Remcos RAT\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2026-04-14T11:04:16+00:00\",\"dateModified\":\"2026-04-14T11:04:17+00:00\",\"description\":\"ANY.RUN uncovers a Google Cloud Storage phishing campaign delivering Remcos RAT. See the attack chain and how to protect your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776161852940\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164580742\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164588178\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164599634\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164614153\"},{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164624442\"}],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying\u00a0Remcos\u00a0RAT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776161852940\",\"position\":1,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776161852940\",\"name\":\"What makes this Google Storage phishing campaign different from traditional attacks?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"It hosts the phishing page on legitimate storage.googleapis.com domains instead of suspicious new sites, bypassing URL reputation filters entirely.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164580742\",\"position\":2,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164580742\",\"name\":\"How does the attack ultimately deliver Remcos RAT?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Through a layered chain of JS, VBS, PowerShell, and in-memory loading that culminates in process hollowing of the trusted RegSvcs.exe binary.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164588178\",\"position\":3,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164588178\",\"name\":\"Why is RegSvcs.exe particularly dangerous in this context?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"It is a signed Microsoft .NET binary with a clean VirusTotal reputation, allowing attackers to inject the Remcos payload without triggering file-based alerts.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164599634\",\"position\":4,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164599634\",\"name\":\"What capabilities does Remcos RAT provide to attackers?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Full remote access, keylogging, credential theft, file exfiltration, screenshot capture, and persistence \u2014 all while running inside legitimate processes.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164614153\",\"position\":5,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164614153\",\"name\":\"How can ANY.RUN\u2019s sandbox help my team detect similar threats?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"It detonates suspicious files\/URLs in a safe environment, reveals the complete behavioral chain, and provides IOCs and process trees for immediate response.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164624442\",\"position\":6,\"url\":\"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164624442\",\"name\":\"What should businesses do immediately to protect against these attacks?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Enable behavioral analysis tools, integrate real-time threat intelligence feeds, train staff on cloud-storage lures, and test suspicious links in an interactive sandbox before opening.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google Cloud Phishing Drops Remcos RAT","description":"ANY.RUN uncovers a Google Cloud Storage phishing campaign delivering Remcos RAT. See the attack chain and how to protect your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying\u00a0Remcos\u00a0RAT","datePublished":"2026-04-14T11:04:16+00:00","dateModified":"2026-04-14T11:04:17+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/"},"wordCount":2845,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior","phishing","RAT"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#respond"]}]},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/","url":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/","name":"Google Cloud Phishing Drops Remcos RAT","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2026-04-14T11:04:16+00:00","dateModified":"2026-04-14T11:04:17+00:00","description":"ANY.RUN uncovers a Google Cloud Storage phishing campaign delivering Remcos RAT. See the attack chain and how to protect your business.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776161852940"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164580742"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164588178"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164599634"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164614153"},{"@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164624442"}],"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"When Trust Becomes a Weapon: Google Cloud Storage Phishing Deploying\u00a0Remcos\u00a0RAT"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776161852940","position":1,"url":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776161852940","name":"What makes this Google Storage phishing campaign different from traditional attacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It hosts the phishing page on legitimate storage.googleapis.com domains instead of suspicious new sites, bypassing URL reputation filters entirely.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164580742","position":2,"url":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164580742","name":"How does the attack ultimately deliver Remcos RAT?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Through a layered chain of JS, VBS, PowerShell, and in-memory loading that culminates in process hollowing of the trusted RegSvcs.exe binary.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164588178","position":3,"url":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164588178","name":"Why is RegSvcs.exe particularly dangerous in this context?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It is a signed Microsoft .NET binary with a clean VirusTotal reputation, allowing attackers to inject the Remcos payload without triggering file-based alerts.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164599634","position":4,"url":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164599634","name":"What capabilities does Remcos RAT provide to attackers?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Full remote access, keylogging, credential theft, file exfiltration, screenshot capture, and persistence \u2014 all while running inside legitimate processes.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164614153","position":5,"url":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164614153","name":"How can ANY.RUN\u2019s sandbox help my team detect similar threats?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It detonates suspicious files\/URLs in a safe environment, reveals the complete behavioral chain, and provides IOCs and process trees for immediate response.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164624442","position":6,"url":"https:\/\/any.run\/cybersecurity-blog\/phishing-google-drive-remcos\/#faq-question-1776164624442","name":"What should businesses do immediately to protect against these attacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Enable behavioral analysis tools, integrate real-time threat intelligence feeds, train staff on cloud-storage lures, and test suspicious links in an interactive sandbox before opening.","inLanguage":"en-US"},"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19993"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=19993"}],"version-history":[{"count":19,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19993\/revisions"}],"predecessor-version":[{"id":20027,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/19993\/revisions\/20027"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/19996"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=19993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=19993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=19993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}