BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

New NANOREMOTE Windows Backdoor Uses Google Drive API for C2

NANOREMOTE: A New Windows Backdoor Leveraging Google Drive API Linked to Chinese Threat Group REF7707

  • A new Windows backdoor named NANOREMOTE uses the Google Drive API for command-and-control operations.
  • NANOREMOTE shares code characteristics with the FINALDRAFT implant linked to the suspected Chinese threat group REF7707.
  • The Malware enables data theft and payload staging via Google Drive with advanced file transfer management features.
  • The attack vector for NANOREMOTE remains unknown, but it uses a loader called WMLOADER for deployment.
  • NANOREMOTE communicates through encrypted HTTP requests and supports 22 commands for reconnaissance and file operations.

Cybersecurity researchers disclosed details of NANOREMOTE, a sophisticated Windows backdoor discovered in December 2025. This malware employs the Google Drive API to send and receive data for command-and-control (C2) purposes. It shares similarities with FINALDRAFT, another implant that uses Microsoft‘s Graph API and is linked to the threat group REF7707, a cluster associated with cyber espionage targeting multiple sectors globally.

- Advertisement -

NANOREMOTE‘s main function is covert data exchange via Google Drive. It includes a task management system capable of queuing, pausing, resuming, and canceling file transfers, along with generating refresh tokens to maintain ongoing operations. These features complicate detection and enable effective data theft and payload management.

The initial infection method is not confirmed. However, observed attacks include WMLOADER, a loader that imitates a Bitdefender crash handler to decrypt shellcode, which launches the backdoor. The malware is developed in C++ and allows operators to conduct reconnaissance, execute commands, and transfer files to and from victim systems through Google Drive API.

NANOREMOTE also connects to a hard-coded, non-routable IP address using HTTP, exchanging encrypted JSON data. This communication uses Zlib compression and AES-CBC encryption with a fixed 16-byte key. The malware contains 22 command handlers to gather host data, manipulate files and directories, run portable executable files, control data transfers, and self-terminate.

An artifact named “wmsetup.log” found on VirusTotal on October 3, 2025, was decrypted by WMLOADER using the same encryption key, revealing FINALDRAFT code. This suggests both malware families share a development environment and possibly the same threat actor, as stated by Elastic Security Labs.

- Advertisement -

REF7707, attributed to suspected Chinese origin, has targeted governments, defense, telecommunications, education, and aviation sectors in Southeast Asia and South America since March 2023. A recent intrusion attributed to this group involved a Russian IT services provider and lasted five months, according to findings published in October 2025.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Critical Flaws Found in vm2 Node.js Sandbox Library

vm2 Node.js library users must urgently update to version 3.11.2 to patch twelve critical...

US Bitcoin Reserve & Crypto Law Clarity Weeks Away

White House advisor Patrick Witt says the CLARITY Act could pass by July 4,...

Musk Claims He’ll End Up Paying Trillions In Taxes

Elon Musk claims a combined 45% federal and state tax rate applies when he...

First Blockchain-Bank US Treasury Trade Settled

Financial giants JPMorgan and Mastercard executed the first cross-border, cross-bank redemption of a tokenized...

Chrome Silently Downloads 4GB Gemini AI Model Without User Consent

Google Chrome is downloading a 4GB AI model file called weights.bin to user devices...

Must Read

Tutorial: How to Buy a Domain Name Permanently? (Super Easy)

Are you ready to establish a permanent online presence and you want to buy a domain forever?In this tutorial, we'll show you how to...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading