HomeCyber BalkansHackers take advantage of Cloudflare for sophisticated phishing attacks

Hackers take advantage of Cloudflare for sophisticated phishing attacks

Published on

spot_img

A recent phishing campaign, attributed to a Russian-speaking threat actor, has been exposed by researchers at Hunt.io. This campaign utilizes Cloudflare services and Telegram for malicious purposes, showcasing a sophisticated and potentially damaging operation that seeks to deceive unsuspecting victims.

The attackers behind this campaign have been employing Cloudflare’s Pages.dev and Workers.dev platforms – typically used for legitimate static website hosting and serverless JavaScript execution – to deliver phishing lures. By impersonating Digital Millennium Copyright Act (DMCA) takedown notices, the phishing pages pressure individuals into downloading files that appear to be harmless PDFs but are, in fact, malicious Windows shortcut (.lnk) files.

Upon execution, these malicious files trigger a malware infection chain, starting with a PowerShell script that downloads additional payloads from a compromised server. These payloads include a ZIP archive containing Python-based malware and a legitimate Python executable. The malware establishes persistence by creating shortcuts in the Windows startup folder and communicates with Pyramid Command-and-Control (C2) servers, exhibiting incremental changes in the delivery mechanism to evade detection.

One notable development in this campaign is the integration of Telegram for enhanced tracking of victims. The malware sends the external IP address of infected hosts to an attacker-controlled Telegram bot, allowing for monitoring and coordination of operations. Despite these advanced tactics, the attackers have shown lapses in operational security, leaving open directories exposed on their servers, which researchers have leveraged to gain insight into their infrastructure and activities.

Over 20 domains utilizing these open directories have been identified, highlighting the scale of this malicious operation. This underscores the abuse of trusted platforms like Cloudflare and Telegram by cybercriminals to disguise their activities and avoid detection. The use of legitimate services not only lends credibility to the phishing pages but also creates challenges in identifying malicious behavior.

Security teams are advised to maintain vigilance against abuse involving Cloudflare domains and protocol handlers, as well as scrutinize Telegram-based communications for signs of malicious activity. As threat actors continuously evolve their tactics, organizations must adapt their defenses to combat the risks posed by increasingly sophisticated phishing campaigns.

In conclusion, this phishing campaign serves as a stark reminder of the ingenuity and persistence of cybercriminals in leveraging legitimate services to carry out malicious activities. It underscores the importance of proactive security measures and the need for organizations to stay ahead of evolving threats in the digital landscape.

For more updates on cybersecurity news, follow us on Google News, LinkedIn, and X to stay informed about the latest developments in the cybersecurity domain.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...