A new threat actor is combining social engineering techniques, abuse of legitimate cloud infrastructure, and custom malware together to create…