News

September 9, 2021

Malware Campaign Exploits Microsoft Dev Tunnels

I. Targeted Entities

This campaign does not target any specific industry and has been observed attacking a wide variety of individuals and organizations. However, the malware utilized by this campaign (njRAT) was found to have originated in the Middle East and is primarily used to target Arabic-speaking countries [1][7].

II. Introduction

Part of the Microsoft Azure official toolkit and used by developers to test apps and sync local testing environments securely over the internet, the ‘dev tunnels’ service has made a surprising appearance in a recent threat campaign leveraging a new variant of the popular njRAT Remote Access Trojan [9]. A blog post published on the SANS Internet Storm Center by security researcher Xavier Mertens (@xme) announced the discovery of the malware, highlighting its creative use of Microsoft’s dev tunnels for communication between infected devices and identified command-and-control (C2) servers [8].

Mertens says he spotted this strain of njRAT sending continuous status updates to C2 servers via dev tunnel URLs. A deeper analysis of captured samples revealed hardcoded server listening ports, the suspected botnet name, client version and capabilities of the malware [8].

JSON extraction of recent njRAT sample (Source: SANS Internet Storm Center)

Reconstructed code showing USB propagation ability (Source: SANS Internet Storm Center)

In his findings, he also discusses the ability of this malware to detect and propagate to external hard drives via USB. Shown in the code snippet below, if the ‘OK.usb’ variable is set to True, the malware will attempt to copy itself to any mounted USB devices [8].

Reconstructed code showing USB propagation ability (Source: SANS Internet Storm Center)

III. Background

First observed in 2012, njRAT has become one of the most widely accessible Remote Access Trojan (RATs) on the market. It features an abundance of educational information with many tutorials available online [1]. This, combined with its open-source nature, has ranked it among the most popular RATs in the world. According to ANY.RUN, a prominent online malware analysis service, the njRAT malware family currently holds the #2 spot for all time total submission count [3]. Though historically used for browser cookie and credential theft, njRAT boasts a wide range of capabilities including keylogging, webcam/screen recording, cryptocurrency theft and wallet enumeration, registry modifications, file uploads, and USB drive propagation [7].

The use of legitimate services to mask command and control communication and data exfiltration, often called ‘C2 tunneling’, is hardly a novel concept. Cloudflare Tunnel (cloudflared), ngrok, and the DNS protocol, have and continue to be exploited by bad actors to conceal this malicious network activity [6]. Interestingly, previous njRAT campaigns have also abused services like Pastebin for C2 tunneling, only this time, there is the added certificate authority trust inherited by routing traffic through Microsoft’s Azure infrastructure [5]. However, the use of dev tunnels for stealth data exfiltration has existed as a proof of concept as early as 2023, when the tool was first released alongside Visual Studio 2022 v17.6 [4][10].

The setup of dev tunnels for C2 redirection is a relatively straightforward process. The threat actor needs only a valid GitHub or Microsoft account and the free executable available on Windows, MacOS, and Linux [11]. With that, they would need to authenticate via the tool with one of the following commands:

After verification, a secure, persistent channel can be deployed by issuing the following:

With the dev tunnel active, all the attacker has to do is bind the channel to their C2 listener port on the same host machine [4]. Now, the control server and infected devices will direct all C2 traffic through a trusted proxy hosted within Microsoft’s Azure cloud infrastructure.

It is worth noting that regardless of the actual traffic direction or protocol being used, the tunnel always presents itself to the victim’s network as outbound TLS traffic. This means that even when an adversary is actively connecting inbound to a victim’s system, the connection appears in network logs and monitoring tools as a standard outbound HTTPS connection originating from the victim’s network [11].

V. MITRE ATT&CK

  • S0385 – njRAT
    This campaign utilizes a variant of the njRAT Remote Access Trojan.
  • TA0011 – Command and Control (C2)
    Following system infection, njRAT will contact a control server awaiting instructions from an attacker. It can be configured to choose from a list of attacker-owned servers.
  • T1572 – Protocol Tunneling
    Using the Microsoft dev tunnel service, infected system outreach, data exfiltration, and malicious commands from the control server occur over disposable, encrypted channels, making it harder for traditional security systems to spot and implement effective preventions.
  • T1547.001 – Registry Run Keys / Startup Folder
    On infected Windows systems, this variation of njRAT creates a registry value entry under the ‘Software\Microsoft\Windows\CurrentVersion\Run\’ key path. To achieve persistence across reboots, the malicious program references itself using this “run key”, executing each time a user logs in.
  • T1082 – System Information Discovery
    The malware performs enumeration of the infected host. It checks the OS version, supported languages, hostname, registry GUID, and other information that is then sent to the control server [2].
  • T1091 – Replication Through Removable Media
    njRAT will attempt to detect any removable drives connected to the system. If found, the malware will create a standalone copy of itself to that drive.

V. Indicators of Compromise (IOCs)

Type Indicator
SHA-256 Hashes 0b0c8fb59db1c32ed9d435abb0f7e2e8c3365325d59b1f3feeba62b7dc0143ee

9ea760274186449a60f2b663f535c4fbbefa74bc050df07614150e8321eccdb7

cb2d8470a77930221f23415a57bc5d6901b89de6c091a3cfbc563e4bf0e7b4eb

c0513783d569051bdc230587729b1da881f7032c2ad6e8fedbbdcc61d813da25

Associated Filenames dsadasfjamsdf.exe

c3df7e844033ec8845b244241c198fcc.exe

Registry Key Software\Microsoft\Windows\CurrentVersion\Run\af63c521a8fa69a8f1d113eb79855a75
IPs 20.103.221[.]187
C2 URLs hxxps://nbw49tk2-27602.euw.devtunnels[.]ms/

hxxps://nbw49tk2-25505.euw.devtunnels[.]ms/

Dev Tunnel Domain Formats global.rel.tunnels.api.visualstudio.com

[clusterId].rel.tunnels.api.visualstudio.com

[clusterId]-data.rel.tunnels.api.visualstudio.com

*.[clusterId].devtunnels.ms

*.devtunnels.ms

VII. Recommendations

Monitor DNS Traffic for Dev Tunnel URLs – Organizations not using dev tunnels should keep an eye on DNS logs for any unexpected dev tunnel URLs (typically ending in “.devtunnels.ms”) that may indicate potential C2 communication [5]. IDS/IPS rules should be applied to automatically alert or block this traffic.

Beware of USB Devices – This variant, as well as previous versions of njRAT, has the ability to detect and spread to external hard drives connected via USB. Users should exercise caution when interacting with unknown USB devices. For critical systems, it may also be advised to locally disable the use of external storage hardware.

Use EDR/Host-Based IDS – The malware’s use of dev tunnels can blend its traffic with normal activity, rendering network intrusion detection efforts less effective. Configuring endpoint protection solutions to detect and flag the use of Microsoft-signed binaries (e.g., devtunnel.exe) by anomalous parent processes or modifications to the auto-run registry can offer another layer of defense to address this gap [5].

Network Segmentation – Botnet malware like njRAT spreads primarily via ‘spray and pray’ orchestration, typically infecting internet-facing devices that lack proper security controls. IoT devices, poorly configured web servers, and routers with deprecated firmware make up a sizable portion of modern botnet infrastructure. If security patches or hardening cannot be applied to such systems, isolating them from the main home or enterprise network is imperative to prevent lateral movement to critical systems.

Stay Informed on the Latest TTPs – As threat actors become more innovative in their detection evasion and exfiltration techniques, security analysts must remain up to speed with the ongoing changes of an evolving threat landscape.

VIII. References

[1] ANY.RUN. (March 9, 2025). NJRAT. https://any.run/malware-trends/njrat

[2] ANY.RUN. (February 27, 2025). dsadasfjamsdf.exe Sandbox Analysis. https://app.any.run/tasks/c01ea110-ecbf-483a-8b0f-d777e255ad9c

[3] ANY.RUN. (March 9, 2025). Malware Trends Tracker. https://any.run/malware-trends/

[4] Au, C. (August 9, 2023). Microsoft Dev Tunnels as C2 Channel. https://www.netero1010-securitylab.com/red-team/microsoft-dev-tunnels-as-c2-channel

[5] Baran, G. (February 28, 2025). Njrat Attacking Users Abusing Microsoft Dev Tunnels for C2 Communications. https://cybersecuritynews.com/njrat-attacking-abusing-microsoft-dev/

[6] BlueteamOps. (Oct 23, 2023). Detecting ‘Dev Tunnels.’ https://detect.fyi/detecting-dev-tunnels-16f0994dc3e2

[7] Check Point. (August 15, 2023). What is NJRat Malware? https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-malware/what-is-njrat-malware/

[8] Mertens, X. (February 27, 2025). Njrat Campaign Using Microsoft Dev Tunnels. https://isc.sans.edu/diary/Njrat%20Campaign%20Using%20Microsoft%20Dev%20Tunnels/31724

[9] Microsoft. (November 17, 2023). What are dev tunnels? https://learn.microsoft.com/en-us/azure/developer/dev-tunnels/overview

[10] Montemagno, J. (February 5, 2024) Dev Tunnels: A Game Changer for Mobile Developers. https://devblogs.microsoft.com/dotnet/dev-tunnels-a-game-changer-for-mobile-developers/

[11] Rossouw, F. (December 5, 2024). Malware of the Day – Tunneling Havoc C2 with Microsoft Dev Tunnels. https://www.activecountermeasures.com/malware-of-the-day-tunneling-havoc-c2-with-microsoft-dev-tunnels/

Threat Advisory created by The Cyber Florida Security Operations Center.

Contributing Security Analyst(s): Isaac Ward

Malware Campaign Exploits Microsoft Dev Tunnels2025-03-31T12:44:43-04:00

Resources for CyberLaunch

REMINDER: Faculty advisors and chaperones are responsible for their respective students AT ALL TIMES. Cyber Florida cannot accept responsibility for student safety. Please ensure your students treat the event team, the hotel, and other guests respectfully.

Join us on WhatsApp:
Cyber Florida CyberLaunch

We have created an optional WhatsApp Community to connect the event administrators with team faculty leads in case you have questions or problems during the event (i.e, running late, can’t find the venue, etc.). It is not required, just an option to help you connect with the event team. Please do not share the link with students; this is intended for event staff and faculty leads only. Thank you!

Agenda

  • 8:00-9:00 AM: Check-In + Breakfast Grand Sierra Ballroom + Hallway
  • 9:00–10:00 AM: Welcome Remarks + Keynote Address Grand Sierra Ballroom
  • 10:00 AM–12:00 PM:
    • Competition Grand Sierra Ballroom
    • Faculty Breakout Sessions: Antigua Rooms 1-3
  • 12:00–1:00 PM: Lunch Grand Sierra Ballroom
  • 1:00-3:00 PM:
    • Competition Grand Sierra Ballroom
    • Faculty Breakout Sessions Antigua Rooms 1-3
  • 3:00-3:30 PM: Break
  • 3:30-4:00 PM: Awards Ceremony Grand Sierra Ballroom
  • 4:00 PM: Event Concludes

Students and faculty advisors are encouraged to visit with exhibitors and cyber mentors throughout the event to learn more about cyber careers.

Faculty advisors may check in on their teams anytime, but we ask that you do not assist with the challenges. Trained volunteers will be available to assist teams as needed while keeping a fair playing field for all participants.

Resort Map

Resources for CyberLaunch2025-03-31T17:20:42-04:00

MEDIA ADVISORY: Nation’s largest (state-wide, state-sponsored) in-person high school cyber competition

CyberLaunch Logo 2025

WHEN: April 4, 2025, from 8:00 a.m. – 4:00 p.m.

WHERE: Caribe Royale Resort, Orlando

WHO:    Nearly 1,000 high school students, teachers, and chaperones from 90 schools in 49 Florida school districts

  • The five largest school districts in Florida are attending
  • The smallest district in Florida is attending (LaFayette)
  • 18 CTE admin attending from 12 districts

WHAT: CyberLaunch, Florida’s annual statewide high school cybersecurity competition

CyberLaunch introduces high school students to the exciting world of cybersecurity through an engaging capture-the-flag style cyber competition, inspiring speakers, and opportunities to interact with industry professionals.

In its second year, the CyberLaunch program includes resources for teachers and students new to cybersecurity, offering classroom activities and practice tools to help competitors familiarize themselves with the platform before the competition.

Media representatives are invited to cover this event to capture high-energy moments from the competition floor, educator breakout sessions, and keynote presentations by industry leaders, including Michael Melore, CISSP, Public Sector Security Evangelist, Ambassador and Chair of Nationwide SecRT – Security Leaders Round Table & Sr Associate Partner, IBM.

Upon conclusion of the competition, Cyber Florida can provide:

  • High-resolution photos of teams, speakers, and key moments
  • Video footage, including B-roll of the event atmosphere and competition highlights
  • Video interviews with student competitors, educators, and Cyber Florida leadership

WHY:    This event aligns with Cyber Florida’s mission to cultivate a robust cybersecurity workforce and support innovative solutions that enhance Florida’s digital resilience.

HOW:    CyberLaunch is provided free to students and schools via funding from the Florida legislature and generous donors.

Please contact Cyber Outreach Manager Jennifer Kleman, APR, CPRC, at Jennifer437@cyberflorida.org to arrange to attend in person or access assets after the event. For more information about Cyber Florida and its mission to advance cybersecurity in the state, visit cyberflorida.org.

Registered Florida School Districts:
Alachua
Baker
Brevard
Broward
Charlotte
Citrus
Clay
Collier
Columbia
Dade
Dixie
Duval
Escambia
FAU Lab School
Flagler
Gadsden
Gilchrist
Gulf
Hamilton
Hardee
Hendry
Hernando
Highlands
Hillsborough
Indian River
Jackson
Lafayette
Lee
Manatee
Marion
Martin
Nassau
Okeechobee
Orange
Osceola
Palm Beach
Pasco
Pinellas
Polk
Putnam
Santa Rosa
Sarasota
St. Johns
Seminole
Suwannee
Tallahassee State College – Academy
Florida Virtual School
Volusia
Washington

ABOUT CYBER FLORIDA AT USF
The Florida Center for Cybersecurity at the University of South Florida, commonly referred to as Cyber Florida at USF, was established by the Florida Legislature in 2014. Its mission is to position Florida as a national leader in cybersecurity through comprehensive education, cutting-edge research, and extensive outreach. Cyber Florida leads various initiatives to inspire and educate current and future cybersecurity professionals, advance applied research, and enhance cybersecurity awareness and safety of individuals and organizations.

MEDIA ADVISORY: Nation’s largest (state-wide, state-sponsored) in-person high school cyber competition2025-03-28T08:50:33-04:00

FirstLine Election Infrastructure Cybersecurity Tabletop Exercise Series

Join our FirstLine team for a dynamic Election Infrastructure Cybersecurity Tabletop Exercise!

This event is designed to bring together elections officials, IT teams, law enforcement, and other key personnel to walk through realistic scenarios and strengthen coordinated responses to cyber and physical security threats.

Don’t miss this chance to improve your cybersecurity posture and resilience!

Where Can I Join?

Remaining summer road trip stops:

Dates are subject to change. If updates are made, notifications will be sent by email to registrants.

Is This Event for You?

This tabletop exercise series is designed for professionals who understand election processes or support them, as well as those responsible for protecting systems, data, and public trust. If you’re involved in planning, incident response, or decision-making in these areas, this is the event for you.

Election Leadership & Administration

  • Supervisors of Elections (SOEs)
  • Assistant SOEs
  • Chief Deputy SOEs
  • Deputy Directors of Voter Services

IT & Systems Personnel (with Elections Focus)

  • IT & Election Systems Supervisors
  • Elections IT
  • IT Analysts / Coordinators
  • IT Managers

Cybersecurity & Risk Management

  • Cybersecurity Manager
  • Sr. Cybersecurity Manager
  • Cybersecurity Community Operations
  • IT Security Administrators
  • Digital Forensics / Incident Response Roles

Law Enforcement & Public Safety Leadership

  • Detectives / Investigators
  • Crime Intelligence Analysts
FirstLine Election Infrastructure Cybersecurity Tabletop Exercise Series2025-06-14T13:18:33-04:00

The Search for the Cyber Unicorn

Are Cyber Unicorns Real? The Truth About Entry-Level Cybersecurity Hiring

Every industry event echoes the same frustration—employers can’t find the right cybersecurity talent, and eager candidates can’t even get an interview. Is the mythical “cyber unicorn”—the perfect entry-level hire with advanced skills and experience—just that, a myth? The Search for the Cyber Unicorn dives deep into this paradox, uncovering the real disconnect between job expectations and candidate qualifications. Through candid interviews with HR professionals across Florida, this report reveals what’s really happening in cybersecurity hiring: how collaboration, internal hiring, and experience weigh into the equation. If you’re tired of the talent gap narrative and ready for real solutions, this report is your guide to bridging the divide.

The Search for the Cyber Unicorn2025-03-28T17:26:27-04:00

Cybersecurity Fundamentals for Florida Manufacturers: FloridaMakes Webinar

This webinar will cover how to plan a simple roadmap and additional recommendations for getting started defending your company from Cybersecurity attacks.

For FloridaMakes clients working with Defense customers, provided is an overview of the Department of Defense Cybersecurity Maturity Model Certification (CMMC) program, and recommendations for getting started and achieving this critical compliance requirement.

Speakers will present the no-cost programs and services available to Florida companies, including the Critical Infrastructure Risk Assessment.

The presentation will conclude with next steps and additional resources to get you on a path toward CMMC compliance.

Finally, extra time will be allocated for a robust Q&A starting with a review of the concerns posed at the prior webinar.

Key Takeaways:        

  • Briefly review the key concepts of cybersecurity, CMMC Level 1 and Level 2, DIB, FCRA and other pertinent acronyms;
  • Resume learning the roadmap for starting a Cybersecurity practice if you don't already have one;
  • Overview and key steps for achieving CMMC compliance for Defense suppliers;
  • No-cost resources provided by Cyber Florida, including the Critical Infrastructure Risk Assessment.
Cybersecurity Fundamentals for Florida Manufacturers: FloridaMakes Webinar2025-04-14T11:18:32-04:00

Teacher Spotlight: Jim Brockman

Jim Brockman

Teacher: Jim Brockman

School: Plant High School

County: Hillsborough

Meet Jim Brockman, a fantastic teacher at Plant High School in Hillsborough County. Originally from Cincinnati, Ohio, Jim has been a passionate educator since the start of his career. After teaching in Ohio and Kentucky, he moved to Tampa, Florida, in 2005 to join Jefferson High School, where his dedication to teaching and student success quickly stood out.

In 2010, he joined Strawberry Crest High School to lead the IB Physics program, playing a key role in shaping the school’s academic environment. Now in his fourth year at Plant High, Jim has expanded his expertise to include computer science and cybersecurity, pioneering the integration of advanced technology into the curriculum.

His contributions to curriculum development in Hillsborough County Public Schools are significant—he has written state course descriptions and exam content. Beyond academics, Jim has coached various extracurricular teams and founded Tampa’s first high school rowing club.

Embracing the opportunity to teach cybersecurity, Jim sees it as a modern solution to the decline of vocational programs, offering students both immediate job prospects and pathways to further education.

Outside the classroom, Jim is also an accomplished musician and a founding member of the band Dads of Lore, showcasing his diverse talents and dedication to enriching lives.

Jim Brockman’s career exemplifies his commitment to education and innovative teaching. He has made a lasting impact on students and the broader educational community.

Would you like to be featured in our Teacher Spotlight? To nominate yourself or another deserving teacher, complete the interest form below!

Teacher Spotlight: Jim Brockman2025-03-25T13:43:13-04:00

OpK12 Virtual Session – April 17, 2025 @ 5pm EST

Join us on April 17, 2025 at 5:00 pm EST

Virtual CyberLaunch debrief: Exploring trends and takeaways from the 2025 Capture the Flag competition

Did you bring students to CyberLaunch and/or want to learn more? Join Cyber Florida and EC Council as we review the results and takeaways from CyberLaunch, the nation’s largest state-wide cybersecurity competition. Together, we will review general results/trends, examine individual scores, answer questions about the competition, and explore future teaching/learning opportunities for your classroom.
OpK12 Virtual Session – April 17, 2025 @ 5pm EST2025-03-14T10:26:40-04:00

OpK12 Virtual Session – March 27, 2025 @ 5pm EST

Join us on March 27, 2025 at 5:00 pm EST for a virtual session just for cyber teachers.

Are you teaching high school cybersecurity in Florida next year? Join Cyber Florida and UTeach to explore instructional resources and an exciting scholarship available for summer professional development. Potential teacher scholarship includes: $500 stipend, professional development ($1,000 value), curriculum licenses ($950 value), on-demand support, and Codio platform accounts!
OpK12 Virtual Session – March 27, 2025 @ 5pm EST2025-03-14T10:07:14-04:00