top of page

New NANOREMOTE Backdoor Uses Google Drive API for Covert C2 and Links to FINALDRAFT Espionage Group

  • Dec 15, 2025
  • 2 min read

Key Findings


  • Elastic Security Labs has uncovered a sophisticated new Windows backdoor called NANOREMOTE that leverages the Google Drive API for covert command-and-control (C2) and data exfiltration operations.

  • NANOREMOTE employs legitimate cloud services to blend its malicious traffic with normal network activity, making it extremely difficult for traditional security tools to detect.

  • The malware uses OAuth 2.0 tokens to authenticate with Google's servers and create a covert channel for transferring data and staging payloads.

  • NANOREMOTE is linked to the FINALDRAFT espionage group based on code reuse and the use of identical encryption keys.


Background


NANOREMOTE is believed to be the work of a seasoned espionage threat actor that has been behind previous high-profile campaigns. The backdoor was first observed in October 2025 and is notable for its ability to "ship data back and forth from the victim endpoint using the Google Drive API."


Infection Chain


The infection chain begins with a deceptive loader component called WMLOADER, which masquerades as a legitimate Bitdefender security program. Once executed, WMLOADER performs a series of decryption steps to reveal and execute the NANOREMOTE backdoor in memory.


Technical Details


  • NANOREMOTE is a fully-featured implant written in C++ that integrates advanced functionality from open-source projects to enhance its stealth and stability.

  • It uses the libPeConv library to load and execute Portable Executable (PE) files directly from disk or memory, bypassing the standard Windows loader to avoid detection.

  • The malware utilizes Microsoft Detours to hook critical process termination functions, making it resilient to failures in individual worker threads.

  • NANOREMOTE employs a robust task management system to handle data transfers, allowing it to queue, pause, and resume file transfers, as well as generate refresh tokens to maintain access without user interaction.


Linking NANOREMOTE to FINALDRAFT


Elastic Security Labs has linked NANOREMOTE to the REF7707 threat cluster, which was previously associated with the FINALDRAFT malware family. The connection is supported by strong forensic evidence, including:


  • Identical code for generating GUIDs and hashing them with the Fowler-Noll-Vo (FNV) function

  • Reuse of the exact same AES key (3A5AD78097D944AC) to decrypt the payloads for both NANOREMOTE and FINALDRAFT


Conclusion


NANOREMOTE represents a sophisticated new Windows backdoor that leverages the trusted infrastructure of Google Drive to evade detection and exfiltrate sensitive data. The malware's use of legitimate cloud services for C2 operations and its connection to the FINALDRAFT espionage group highlight the evolving tactics of advanced threat actors.


Sources


  • https://securityonline.info/new-nanoremote-backdoor-uses-google-drive-api-for-covert-c2-and-links-to-finaldraft-espionage-group/

  • https://x.com/the_yellow_fall/status/2000396600125088186

  • https://thehackernews.com/2025/12/nanoremote-malware-uses-google-drive.html

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page