APT31 Today: When Trusted Cloud Infrastructure Becomes the Attack Surface

  • December 7, 2025
  • 5 mins
  • Apt

TL’DR

APT31 is winning by abusing trust — Microsoft Dev Tunnels, cloud storage, and signed binaries become covert C2 paths that look like normal enterprise traffic.


MITRE ATT&CK Coverage at a Glance

TacticTechniquesSpotlight
Initial AccessPhishing; exploit of public-facing applications
ExecutionUser execution
PersistenceScheduled task or jobDeep dive
DiscoveryFile and directory discovery; browser credential access; network service discovery; local system data; account discovery
Credential AccessKeylogging; OS credential dumping
Lateral MovementRDP; pass-the-hash; lateral tool transfer
Command and ControlInternal proxy; ingress tool transfer; web service (cloud C2); non-standard ports; encrypted channels; multi-hop proxyDeep dive
Defense EvasionDLL sideloading; obfuscated files; multi-hop proxy via developer toolingNew technique focus
ExfiltrationExfiltration to cloud storage

Deep Dive: Defense Evasion by Abusing Microsoft Trust

Technique: Multi-hop Proxy via Microsoft Dev Tunnels

MITRE: Defense Evasion, Command and Control

APT31 abused Microsoft Dev Tunnels, a legitimate feature used by Visual Studio and VS Code, to establish a covert and highly resilient C2 channel.

How It Works

  • The infected host establishes an outbound encrypted connection to Microsoft-owned infrastructure
  • Traffic flows through a Microsoft-hosted Dev Tunnel endpoint
  • The attacker accesses the tunnel from the other side, gaining interactive control

From the defender’s perspective:

  • The destination is a trusted Microsoft domain
  • The protocol is standard HTTPS over port 443
  • The traffic pattern resembles normal developer activity

This effectively removes the attacker’s infrastructure from direct visibility and shifts detection responsibility onto behavioral analysis, not network reputation.


Cloud C2 via Legitimate Web Services

APT31 also relied on cloud storage platforms such as OneDrive, Dropbox, and Yandex.Cloud to host payloads and retrieve commands.

APT31 command retrieval from cloud storage

APT31 using cloud storage for staging payloads

This approach mirrors the Dev Tunnel strategy:

  • Trusted platforms
  • Encrypted traffic
  • Blending with normal enterprise usage

Cloud services become both delivery mechanism and command channel.


DLL Sideloading via Signed Microsoft Binaries

APT31 delivered malware using phishing lures that launched a legitimate signed executable vulnerable to DLL sideloading.

Sharp_AD sideloading tool

BsSndRpt64.exe sideloading chain

A malicious .lnk file triggered execution of BsSndRpt64.exe, which then loaded the attacker-controlled BugSplatRc64.dll. The malware inherited the trust and legitimacy of the signed binary, bypassing basic application controls.


Persistence Through Hidden Scheduled Tasks

To maintain access, APT31 created scheduled tasks with names resembling legitimate software, then deliberately hid them by removing the task’s SecurityDescriptor from the registry.

APT31 task creation registry keys

Hidden scheduled task XML

The task continued to execute normally while remaining invisible to standard Windows management tools.


Why This Matters

  • Trust relationships are now primary attack vectors
  • Cloud platforms are operational infrastructure for attackers
  • C2 no longer requires attacker-owned servers
  • Detection failures increasingly stem from assumed legitimacy

This is not a vulnerability problem. It is a trust and visibility problem.


Takeaways

For all teams: Cloud services, developer tooling, and signed binaries are now active attack surfaces.
For red teams: This is a playbook for abusing trust, workflows, and platform legitimacy.
For defenders: Focus on behavioral anomalies, not domain reputation or IP allowlists.


References