Thursday, April 24, 2025
HomeAmazon AWSChinese CDN Exploiting AWS & Microsoft Cloud to Host Malicious Websites

Chinese CDN Exploiting AWS & Microsoft Cloud to Host Malicious Websites

Published on

SIEM as a Service

Follow Us on Google News

A recent investigation by cybersecurity firm Silent Push has revealed how a China-linked Content Delivery Network (CDN), known as FUNNULL, is exploiting major cloud providers like Amazon Web Services (AWS) and Microsoft Azure to host malicious websites.

The technique, termed “infrastructure laundering,” allows cybercriminals to mask their activities by renting IP addresses from legitimate cloud services and mapping them to fraudulent domains.

This method enables phishing campaigns, investment scams, and money laundering operations, posing significant challenges for cloud providers and cybersecurity efforts.

- Advertisement - Google News

Exploitation of Cloud Platforms

FUNNULL has reportedly rented over 1,200 IP addresses from AWS and nearly 200 from Azure, using stolen or fraudulent accounts to bypass detection.

Once acquired, these IPs are linked to malicious domains via DNS CNAME records, allowing the network to host over 200,000 unique hostnames, 95% of which are generated through Domain Generation Algorithms (DGAs).

Chinese CDN
Map of FUNNULL CNAME Chains

These domains support scams targeting major brands like Bwin, Chanel, and eBay, as well as fake trading platforms and gambling websites.

The infrastructure laundering process relies on intermediaries that obscure the origins of criminal activities.

Unlike traditional “bulletproof hosting,” which resists takedown efforts entirely, infrastructure laundering leverages the credibility of mainstream cloud providers.

This makes it difficult for defenders to block malicious traffic without disrupting legitimate services hosted on the same platforms.

Challenges for Cloud Providers

Despite efforts by AWS and Azure to suspend fraudulent accounts linked to FUNNULL’s activities, the CDN continues to acquire new IPs at a rapid pace.

Silent Push’s research indicates that FUNNULL has been renting Microsoft IP space since at least 2021.

The persistent cycling of IP addresses highlights vulnerabilities in account verification processes and DNS monitoring systems used by cloud providers.

Chinese CDN
CNAME records for cmegrouphkpd[.]info

AWS has acknowledged the issue and emphasized its ongoing efforts to detect and suspend fraudulently acquired accounts.

However, Silent Push has raised concerns about the effectiveness of current measures, questioning why cloud providers are unable to identify such schemes in real time.

The firm suggests that better tracking of CNAME chains could help prevent illicit IP rentals more effectively.

FUNNULL’s operations have facilitated extensive cybercriminal activities linked to transnational organized crime groups such as Chinese Triads.

For example, dozens of fake Bwin gambling websites were discovered hosted on Microsoft infrastructure.

Additionally, FUNNULL was involved in a supply chain attack in 2024 that compromised the popular JavaScript library polyfill.io, impacting over 110,000 websites globally.

The network’s ability to blend malicious activities with legitimate web traffic complicates mitigation efforts.

Silent Push’s findings underscore the need for coordinated action among cloud providers, cybersecurity firms, and law enforcement agencies to address this growing threat.

As cybercriminals continue exploiting gaps in cloud infrastructure management, organizations must adopt robust security measures such as real-time monitoring tools, stricter account verification processes, and enhanced DNS tracking systems.

Collaborative efforts between stakeholders will be critical in combating this sophisticated form of cybercrime.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...

GitLab Releases Critical Patch for XSS, DoS, and Account Takeover Bugs

GitLab, a leading DevOps platform, has released a critical security patch impacting both its...

SonicWall SSLVPN Flaw Allows Hackers to Crash Firewalls Remotely

SonicWall has issued an urgent advisory (SNWLID-2025-0009) warning of a high-severity vulnerability in its...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...

GitLab Releases Critical Patch for XSS, DoS, and Account Takeover Bugs

GitLab, a leading DevOps platform, has released a critical security patch impacting both its...