Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/Threats/CloudEyE MaaS Downloader and Cryptor Infects 100,000+ Users Worldwide
Threats

CloudEyE MaaS Downloader and Cryptor Infects 100,000+ Users Worldwide

A significant malware campaign has surfaced across Central and Eastern Europe, quickly drawing widespread concern within the cybersecurity community. CloudEyE, a Malware-as-a-Service downloader and...

David kimber
David kimber
January 6, 2026 2 Min Read
9 0

A significant malware campaign has surfaced across Central and Eastern Europe, quickly drawing widespread concern within the cybersecurity community.

CloudEyE, a Malware-as-a-Service downloader and cryptor, has rapidly gained traction among threat actors seeking to distribute other harmful malware payloads.

In the second half of 2025, security researchers detected this threat at an alarming scale, marking a significant shift in how modern malware operates and spreads.

The emergence of CloudEyE represents a growing trend where cybercriminals rent out malware infrastructure rather than developing standalone threats.

This approach allows attackers to target a broader range of victims without needing extensive technical expertise. The malware serves as a delivery mechanism for other dangerous payloads such as Rescoms, Formbook, and Agent Tesla, each capable of stealing sensitive data or compromising entire systems.

What makes CloudEyE particularly troubling is its ability to conceal its true purpose while deploying multiple harmful components.

ESET Research analysts identified CloudEyE after detecting a massive surge in attack activity during the latter half of 2025.

The researchers observed a thirtyfold increase in CloudEyE detections within just six months, accumulating over 100,000 hits worldwide. This dramatic rise suggests the malware has become a preferred tool among cybercriminals operating across Europe and potentially beyond.

In H2 2025, #ESETresearch saw a thirtyfold increase in #CloudEyE detections, amounting to more than 100,000 hits over the course of six months. CloudEyE is a #MaaS downloader and cryptor used to conceal and deploy other malware, such as #Rescoms, #Formbook, and #Agent Tesla. 1/5 pic.twitter.com/iO5ZlkuNyb

— ESET Research (@ESETresearch) January 6, 2026

The infection mechanism behind CloudEyE reveals sophisticated multi-stage delivery tactics designed to avoid detection. The initial stage operates as a downloader that spreads through PowerShell scripts, JavaScript files, and NSIS executable installers.

Once installed on a victim’s computer, this first stage component downloads the next phase of the attack—a cryptor component that encrypts and obfuscates the final payload before execution.

Every stage of CloudEyE is heavily obfuscated, making analysis and detection extremely challenging for security tools and researchers alike.

Delivery campaigns

The delivery campaigns weaponize social engineering and compromise legitimate channels to maximize infection rates.

Most CloudEyE attack attempts targeted businesses through email-based campaigns in Central and Eastern Europe during September and October 2025.

Attackers crafted convincing messages by using compromised legitimate business accounts and tailoring content to match the language and cultural context of targeted countries.

These emails typically posed as routine business inquiries, such as invoice payment requests, package tracking notifications, or purchase order confirmations, making them appear entirely legitimate to unsuspecting recipients.

Organizations worldwide should implement robust email filtering, maintain current security software, and train employees to recognize suspicious messages. Awareness of CloudEyE’s presence and tactics provides critical protection against this escalating threat.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active

Next Post

Fake WordPress Renewal Email Steals Admin Credit Card Data

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us