New Pheno Plugin Turns Microsoft Phone Link into a Stealthy SMS and OTP Thief

Overview

A newly discovered variant of the CloudZ remote access trojan (RAT) is leveraging an innovative plugin named Pheno to hijack the trusted Microsoft Phone Link service. This attack enables cybercriminals to intercept SMS messages and one-time passwords (OTPs) from compromised mobile devices, posing a significant threat to two-factor authentication (2FA) security.

New Pheno Plugin Turns Microsoft Phone Link into a Stealthy SMS and OTP Thief
Source: www.bleepingcomputer.com

How the Attack Works

The malware operates in a multi‑stage fashion, combining the established capabilities of CloudZ with the novel Phone Link abuse. The process typically unfolds as follows:

Technical Details of the Hijack

The Pheno plugin does not require elevated privileges beyond what the Phone Link app already possesses. It hooks into the shared memory buffer used by Phone Link to synchronize messages between devices. By monitoring this buffer in real time, Pheno can capture each incoming SMS before the user even reads it. The plugin also maintains a local cache to avoid duplicate exfiltration and to evade detection by signature‑based antivirus tools.

Microsoft Phone Link is a legitimate utility that enables users to read SMS, make calls, and manage notifications from their PC. While convenient, its deep integration with the operating system makes it an attractive target for malware. The attack exploits the trust that security software places in Phone Link’s activities, as the app is often whitelisted by default. Furthermore, because Phone Link already has permission to access SMS content, Pheno can operate without triggering additional permission prompts on the mobile device.

Previous Cases and Similar Techniques

This is not the first time malware has targeted the Phone Link ecosystem. Past campaigns have used trojanized versions of Phone Link or exploited its notification mirroring to phish users. However, the CloudZ/Pheno combination marks the first instance of a plugin directly hijacking the message‑synchronization protocol to steal OTPs in bulk.

Impact and Implications

The theft of OTPs undermines one of the most popular 2FA methods. Even if a user has enabled two‑factor authentication, an attacker armed with a valid OTP can log in as long as they also have the victim’s password. This makes the attack particularly dangerous for:

New Pheno Plugin Turns Microsoft Phone Link into a Stealthy SMS and OTP Thief
Source: www.bleepingcomputer.com

Additionally, because the attack works silently in the background, victims may not realize their OTPs are being stolen until they see unauthorized logins on their accounts.

Mitigation Strategies

To defend against this and similar threats, users and organizations should adopt a layered security approach:

  1. Use app‑based authenticators – replace SMS‑based 2FA with authenticator apps (e.g., Microsoft Authenticator, Google Authenticator) or hardware tokens. These generate codes offline and are not accessible via Phone Link.
  2. Monitor Phone Link permissions – regularly review which applications have access to SMS data on the mobile device. Revoke access for any suspicious apps or unused connections.
  3. Deploy endpoint detection and response (EDR) – modern EDR tools can detect anomalous behavior such as code injection into trusted processes like Phone Link.
  4. Keep software updated – ensure Microsoft Phone Link and the operating system are patched against known vulnerabilities that malware could exploit.
  5. Educate users about phishing – since CloudZ often arrives via email, training users to spot phishing attempts can prevent the initial infection.

Conclusion

The emergence of the Pheno plugin demonstrates how cybercriminals continuously evolve their techniques to bypass security measures. By abusing a trusted, built‑in application like Microsoft Phone Link, CloudZ can silently siphon OTPs and defeat 2FA. As remote access and mobile‑to‑PC integration grow, users must remain vigilant and adopt stronger authentication methods to protect their digital identities.

Recommended

Discover More

How Microsoft’s DLSS competitor is now available on the Xbox Ally X handheldHow to Transform Your PlayStation 5 into a Linux Gaming Machine: A Step-by-Step GuidePython 3.15.0a4 Released with Build Error Alert – Corrected Alpha 5 on the WayGalaxy Ring 2 Pushed to 2027: Samsung Targets 10-Day Battery in Major OverhaulFBI Recovers Deleted Signal Messages from iPhone Notification Cache