The “SERPENTINE#CLOUD” campaign represents a highly sophisticated and stealthy malware operation that innovatively leverages legitimate Cloudflare Tunnel infrastructure to deliver malicious payloads. Initiated through phishing emails containing disguised Windows shortcut (.lnk) files, the attack unfolds in a multi-stage process involving obfuscated batch, VBScript, and Python scripts, designed for advanced evasion. This culminates in the memory-injection of Donut-packed payloads, enabling fileless execution that minimizes forensic traces and establishes full command and control over compromised systems, with observed final payloads including RATs such as AsyncRAT or RevengeRAT. By exploiting trusted cloud services and employing adaptive, multi-layered techniques, SERPENTINE#CLOUD highlights a significant evolution in cyber threats.
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox