Nanoremote Malware: A Comedy of Errors with Google Drive C2 Shenanigans
Elastic Security Labs has discovered a sneaky Windows backdoor, NANOREMOTE, using the Google Drive API for command and control. It’s like FINALDRAFT’s mischievous cousin, using similar code but with a new twist. This malware is a master of disguise, making data theft look like just another file upload to the cloud.

Hot Take:
When malware gets a Google Drive upgrade, you know even cybercriminals are keeping up with the cloud storage trends. NANOREMOTE is like that one friend who uses your Netflix account without asking but does it with your computer. It’s a tech-savvy burglar that knows how to use the cloud better than most of us!
Key Points:
– Elastic Security Labs discovered NANOREMOTE, a Windows backdoor using Google Drive API for command and control (C2).
– NANOREMOTE shares code with FINALDRAFT and is linked to threat group REF7707.
– The malware uses a disguised loader, WMLOADER, to prepare for shellcode execution.
– NANOREMOTE supports 22 commands for full control over infected systems, including file management and command execution.
– Advanced use of Google Drive API complicates detection due to blending with normal encrypted cloud traffic.
