Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Packagist: Urgent Composer Update After GitHub Token Leak
May 14, 2026
Seedworm APT Abuses Fortemedia & SentinelOne Signed Binaries
May 14, 2026
Critical Windows DNS Client Flaw Allows Remote Code Execution
May 14, 2026
Home/Threats/Hackers Use Google Cloud to Bypass Filters, Deliver Remcos
Threats

Hackers Use Google Cloud to Bypass Filters, Deliver Remcos

Threat actors are actively exploiting Google Cloud Storage (GCS) to host malicious files, bypassing traditional email security filters and delivering the Remcos Remote Access Trojan (RAT). This...

Emy Elsamnoudy
Emy Elsamnoudy
April 15, 2026 One Min Read
14 0

Threat actors are actively exploiting Google Cloud Storage (GCS) to host malicious files, bypassing traditional email security filters and delivering the Remcos Remote Access Trojan (RAT). This sophisticated campaign targets organizations across various sectors, utilizing phishing emails as the initial compromise vector. Recipients receive emails containing a malicious link that directs them to a GCS bucket, where a ZIP archive awaits download.

Since RegSvcs.exe carries a clean reputation on VirusTotal, this stage appears completely normal to most endpoint protection tools, making it nearly invisible without behavioral monitoring.

Security teams should treat any storage.googleapis.com link with the same caution as an unknown domain, since trusting a platform name does not guarantee safe content.

Behavioral analysis tools that observe post-click activity are far more effective than signature-based detection alone.

Employees in finance, procurement, and leadership roles should be trained to recognize cloud-storage phishing lures and never download files from unexpected login prompts.

Suspicious JavaScript and script files must always be tested in an isolated environment before running on any production system.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

HackerphishingSecurity

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Hackers Hid Backdoor in Trusted WordPress Plugins for

Next Post

MuddyWater Hackers Scan Systems, Hit MuddyWater-Style Before

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Gentlemen RaaS Exploits Fortinet & Leverages Cisco
May 14, 2026
Windows BitLocker 0-Day Allows Vulnerability Enables
May 14, 2026
SOCs & MSSPs Prevent Phishing Missed Incidents Email
May 13, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us