Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1105
(Ingress Tool Transfer)
T1071.001
(Application Layer Protocol: Web Protocols)
T1218
(System Binary Proxy Execution)
CVE Profile
[CVSS 8.8]
[CISA KEV Status: Active]
Note
While the core mechanism is an architectural abuse of legacy features, recent similar vulnerabilities (like CVE-2025-33053) reflect active exploitation of WebDAV protocol handling.
Telemetry
Domains
tiny-fixtures-glossary-
advantage[.]trycloudflare[.]com
nasdaq-aged-sf-cheers[.]trycloudflare[.]com
Payloads
XWorm RAT
Async RAT
DcRAT.
This suggests the deployment of secondary command-and-control capabilities post-execution.
Delivery
.url and .lnk shortcuts utilizing UNC paths (e.g., \\exampledomain[.]com@SSL\DavWWWRoot\). File sizes and container types outside of these parameters are Unknown.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Issue a flash advisory regarding Cloudflare Tunnel abuse and the risk of unmonitored WebDAV protocol execution.
DETECT (DE) – Monitoring & Analysis
Command
Implement SIEM rules to detect anomalous DNS queries for *.trycloudflare.com originating from standard user endpoints.
Command
Hunt for abnormal svchost.exe (WebClient service) network connections over ports 80/443 pointing to unknown external IP addresses.
RESPOND (RS) – Mitigation & Containment
Command
Isolate endpoints exhibiting outbound WebDAV traffic to unauthorized external domains.
RECOVER (RC) – Restoration & Trust
Command
Validate the complete removal of any identified RAT payloads (XWorm, Async, DcRAT) before reconnecting the affected endpoint to the enterprise domain.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Disable the WebClient service via Group Policy (GPO) across the enterprise if WebDAV functionality is not explicitly required for business operations.
Command
Block trycloudflare[.]com at the perimeter firewall or secure web gateway.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately if you accidentally open a shortcut file that mounts a folder resembling a local drive.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords and MFA parameters using a known clean device (e.g., phone on 5G), as RATs actively harvest keystrokes and session tokens.
Priority 3: Persistence
Command
Check Scheduled Tasks, Startup Folders, and Browser Extensions for suspicious entries.
Command
Run a full system scan with Microsoft Defender or a reputable anti-malware solution.
Hardening & References
Baseline
CIS Benchmarks for Windows 10/11 (Guidance: Disable WebClient Service).
Framework
NIST CSF 2.0 / SP 800-61r3.
Reference
Microsoft advisory on deprecation of native WebDAV support in Windows File Explorer (November 2023).
Source
Cofense Blog
Cyber Security News