New NANOREMOTE Windows Backdoor Uses Google Drive API for C2

NANOREMOTE: A New Windows Backdoor Leveraging Google Drive API Linked to Chinese Threat Group REF7707

  • A new Windows backdoor named NANOREMOTE uses the Google Drive API for command-and-control operations.
  • NANOREMOTE shares code characteristics with the FINALDRAFT implant linked to the suspected Chinese threat group REF7707.
  • The Malware enables data theft and payload staging via Google Drive with advanced file transfer management features.
  • The attack vector for NANOREMOTE remains unknown, but it uses a loader called WMLOADER for deployment.
  • NANOREMOTE communicates through encrypted HTTP requests and supports 22 commands for reconnaissance and file operations.

Cybersecurity researchers disclosed details of NANOREMOTE, a sophisticated Windows backdoor discovered in December 2025. This malware employs the Google Drive API to send and receive data for command-and-control (C2) purposes. It shares similarities with FINALDRAFT, another implant that uses Microsoft‘s Graph API and is linked to the threat group REF7707, a cluster associated with cyber espionage targeting multiple sectors globally.

- Advertisement -

NANOREMOTE‘s main function is covert data exchange via Google Drive. It includes a task management system capable of queuing, pausing, resuming, and canceling file transfers, along with generating refresh tokens to maintain ongoing operations. These features complicate detection and enable effective data theft and payload management.

The initial infection method is not confirmed. However, observed attacks include WMLOADER, a loader that imitates a Bitdefender crash handler to decrypt shellcode, which launches the backdoor. The malware is developed in C++ and allows operators to conduct reconnaissance, execute commands, and transfer files to and from victim systems through Google Drive API.

NANOREMOTE also connects to a hard-coded, non-routable IP address using HTTP, exchanging encrypted JSON data. This communication uses Zlib compression and AES-CBC encryption with a fixed 16-byte key. The malware contains 22 command handlers to gather host data, manipulate files and directories, run portable executable files, control data transfers, and self-terminate.

An artifact named “wmsetup.log” found on VirusTotal on October 3, 2025, was decrypted by WMLOADER using the same encryption key, revealing FINALDRAFT code. This suggests both malware families share a development environment and possibly the same threat actor, as stated by Elastic Security Labs.

- Advertisement -

REF7707, attributed to suspected Chinese origin, has targeted governments, defense, telecommunications, education, and aviation sectors in Southeast Asia and South America since March 2023. A recent intrusion attributed to this group involved a Russian IT services provider and lasted five months, according to findings published in October 2025.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Riot Platforms Reports Record $647.4M Revenue in 2025

Riot Platforms reported record annual revenue of $647.4 million for 2025, a 72% increase...

Ethereum Whale Spends $10.9M on 5K ETH Amid Market Dip

A previously inactive whale purchased 5,350 ETH worth $10.9 million as prices hover near...

Crypto Regulation Talks Stalled After Deadline Miss

The CLARITY Act missed its March 1 deadline set by the White House Crypto...

Bitcoin Nearing Bottom, Says VanEck CEO Jan van Eck

VanEck CEO Jan van Eck asserts Bitcoin is near its bottom, driven by the...

Human Brain Cells Trained to Play Doom in Lab

Cortical Labs has successfully trained 200,000 living human neurons to play the 1993 video...

Must Read

How to Buy VPS with Crypto from Hostinger – Step by Step guide

Did you know that nowadays you can use Bitcoin to purchase a Windows VPS? If you’re here, you’re probably wondering how to do it....
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!