By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware
Tech News

Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware

By Viral Trending Content 4 Min Read
Share
SHARE

Aug 02, 2024Ravie LakshmananMalware / Network Security

Cloudflare Tunnels

Cybersecurity companies are warning about an uptick in the abuse of Clouflare’s TryCloudflare free service for malware delivery.

The activity, documented by both eSentire and Proofpoint, entails the use of TryCloudflare to create a one-time tunnel that acts as a conduit to relay traffic from an attacker-controlled server to a local machine through Cloudflare’s infrastructure.

Attack chains taking advantage of this technique have been observed delivering a cocktail of malware families such as AsyncRAT, GuLoader, PureLogs Stealer, Remcos RAT, Venom RAT, and XWorm.

The initial access vector is a phishing email containing a ZIP archive, which includes a URL shortcut file that leads the message recipient to a Windows shortcut file hosted on a TryCloudflare-proxied WebDAV server.

Cybersecurity

The shortcut file, in turn, executes next-stage batch scripts responsible for retrieving and executing additional Python payloads, while simultaneously displaying a decoy PDF document hosted on the same WebDAV server to keep up the ruse.

“These scripts executed actions such as launching decoy PDFs, downloading additional malicious payloads, and changing file attributes to avoid detection,” eSentire noted.

“A key element of their strategy was using direct syscalls to bypass security monitoring tools, decrypting layers of shellcode, and deploying the Early Bird APC queue injection to stealthily execute code and evade detection effectively.”

Cloudflare Tunnels

According to Proofpoint, the phishing lures are written in English, French, Spanish, and German, with the email volumes ranging from hundreds to tens of thousands of messages that target organizations from across the world. The themes cover a broad range of topics such as invoices, document requests, package deliveries, and taxes.

The campaign, while attributed to one cluster of related activity, has not been linked to a specific threat actor or group, but the email security vendor assessed it to be financially motivated.

The exploitation of TryCloudflare for malicious ends was first recorded last year, when Sysdig uncovered a cryptojacking and proxyjacking campaign dubbed LABRAT that weaponized a now-patched critical flaw in GitLab to infiltrate targets and obscure their command-and-control (C2) servers using Cloudflare tunnels.

Furthermore, the use of WebDAV and Server Message Block (SMB) for payload staging and delivery necessitates that enterprises restrict access to external file-sharing services to only known, allow-listed servers.

“The use of Cloudflare tunnels provide the threat actors a way to use temporary infrastructure to scale their operations providing flexibility to build and take down instances in a timely manner,” Proofpoint researchers Joe Wise and Selena Larson said.

Cloudflare Tunnels

“This makes it harder for defenders and traditional security measures such as relying on static blocklists. Temporary Cloudflare instances allow attackers a low-cost method to stage attacks with helper scripts, with limited exposure for detection and takedown efforts.”

The findings come as the Spamhaus Project called on Cloudflare to review its anti-abuse policies following cybercriminals’ exploitation of its services to mask malicious actions and enhance their operational security by means of what’s called “living-off-trusted-services” (LoTS).

It said it “observes miscreants moving their domains, which are already listed in the DBL, to Cloudflare to disguise the backend of their operation, be it spamvertized domains, phishing, or worse.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor

Samsung Galaxy Z Fold 8 Wide Edition: Features and Specs

Social Voice social media intelligence Spark Venture Funding

MediSnap helping vulnerable patients, Declan Watters

The Worst Hacks of 2025

TAGGED: Cloud security, cloud services, Cyber Security, Cybercrime, Cybersecurity, email security, Internet, IT security, Malware, phishing, Threat Intelligence
Share This Article
Facebook Twitter Copy Link
Previous Article China takes bite out of Apple’s earnings as Amazon numbers weaken
Next Article Bitcoin Hashrate Hits All-Time High as Trump Vows to Boost Industry
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Out of touch or in your hands? Know more, ask more with Euronews’ EU.XL coverage
World News
Where Is Brigitte Bardot’s Son Nicolas-Jacques Charrier Now? His Life Today
Celebrity
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
Tech News
Why Israel's recognition of Somaliland as an independent state is controversial
World News
Financials, consumption and manufacturing to lead next market upcycle: Vikas Khemani
Business
Samsung Galaxy Z Fold 8 Wide Edition: Features and Specs
Tech News
Europe’s rail network renaissance continues with five new trains launching in 2026
Travel

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Out of touch or in your hands? Know more, ask more with Euronews’ EU.XL coverage

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Out of touch or in your hands? Know more, ask more with Euronews’ EU.XL coverage
December 30, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?