By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware
Tech News

Cybercriminals Abusing Cloudflare Tunnels to Evade Detection and Spread Malware

By Viral Trending Content 4 Min Read
Share
SHARE

Aug 02, 2024Ravie LakshmananMalware / Network Security

Cloudflare Tunnels

Cybersecurity companies are warning about an uptick in the abuse of Clouflare’s TryCloudflare free service for malware delivery.

The activity, documented by both eSentire and Proofpoint, entails the use of TryCloudflare to create a one-time tunnel that acts as a conduit to relay traffic from an attacker-controlled server to a local machine through Cloudflare’s infrastructure.

Attack chains taking advantage of this technique have been observed delivering a cocktail of malware families such as AsyncRAT, GuLoader, PureLogs Stealer, Remcos RAT, Venom RAT, and XWorm.

The initial access vector is a phishing email containing a ZIP archive, which includes a URL shortcut file that leads the message recipient to a Windows shortcut file hosted on a TryCloudflare-proxied WebDAV server.

Cybersecurity

The shortcut file, in turn, executes next-stage batch scripts responsible for retrieving and executing additional Python payloads, while simultaneously displaying a decoy PDF document hosted on the same WebDAV server to keep up the ruse.

“These scripts executed actions such as launching decoy PDFs, downloading additional malicious payloads, and changing file attributes to avoid detection,” eSentire noted.

“A key element of their strategy was using direct syscalls to bypass security monitoring tools, decrypting layers of shellcode, and deploying the Early Bird APC queue injection to stealthily execute code and evade detection effectively.”

Cloudflare Tunnels

According to Proofpoint, the phishing lures are written in English, French, Spanish, and German, with the email volumes ranging from hundreds to tens of thousands of messages that target organizations from across the world. The themes cover a broad range of topics such as invoices, document requests, package deliveries, and taxes.

The campaign, while attributed to one cluster of related activity, has not been linked to a specific threat actor or group, but the email security vendor assessed it to be financially motivated.

The exploitation of TryCloudflare for malicious ends was first recorded last year, when Sysdig uncovered a cryptojacking and proxyjacking campaign dubbed LABRAT that weaponized a now-patched critical flaw in GitLab to infiltrate targets and obscure their command-and-control (C2) servers using Cloudflare tunnels.

Furthermore, the use of WebDAV and Server Message Block (SMB) for payload staging and delivery necessitates that enterprises restrict access to external file-sharing services to only known, allow-listed servers.

“The use of Cloudflare tunnels provide the threat actors a way to use temporary infrastructure to scale their operations providing flexibility to build and take down instances in a timely manner,” Proofpoint researchers Joe Wise and Selena Larson said.

Cloudflare Tunnels

“This makes it harder for defenders and traditional security measures such as relying on static blocklists. Temporary Cloudflare instances allow attackers a low-cost method to stage attacks with helper scripts, with limited exposure for detection and takedown efforts.”

The findings come as the Spamhaus Project called on Cloudflare to review its anti-abuse policies following cybercriminals’ exploitation of its services to mask malicious actions and enhance their operational security by means of what’s called “living-off-trusted-services” (LoTS).

It said it “observes miscreants moving their domains, which are already listed in the DBL, to Cloudflare to disguise the backend of their operation, be it spamvertized domains, phishing, or worse.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

iRobot Promo Code: 15% Off

Samsung One UI 9 Gets Screen Time Feature that Google Should’ve Made

INTERPOL Operation Ramz Disrupts MENA Cybercrime Networks with 201 Arrests

Motorola Razr Fold Unboxing: Worth the $1,899 Price Tag?

Dublin’s Ubotica teams with Novi for real-time orbital data analysis

TAGGED: Cloud security, cloud services, Cyber Security, Cybercrime, Cybersecurity, email security, Internet, IT security, Malware, phishing, Threat Intelligence
Share This Article
Facebook Twitter Copy Link
Previous Article China takes bite out of Apple’s earnings as Amazon numbers weaken
Next Article Bitcoin Hashrate Hits All-Time High as Trump Vows to Boost Industry
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

iRobot Promo Code: 15% Off
Tech News
Barcelona 3-1 Real Betis: Talking points as La Liga champions end home campaign in triumphant manner
Sports
36% off its highs, is Experian one of the best FTSE 100 stocks to buy right now?
Business
Pope Leo launches an AI commission days before he releases a papal letter alongside Anthropic cofounder Christopher Olah
Business
Galaxy secures New York BitLicense to expand institutional crypto services
Crypto
EU honours Merkel as stabilizer in nod to Trump-era turbulence
World News
Bitcoin And Ethereum Hit By $2.2B In Sell Pressure: Analyst Explains Coordinated Market Selloff
Crypto

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

iRobot Promo Code: 15% Off

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
iRobot Promo Code: 15% Off
May 19, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?