Wednesday, April 23, 2025
HomeAmazon AWSHackers Exploit AWS & Microsoft Azure for Large-Scale Cyber Attacks

Hackers Exploit AWS & Microsoft Azure for Large-Scale Cyber Attacks

Published on

SIEM as a Service

Follow Us on Google News

Silent Push, a cybersecurity research firm, has introduced the term “infrastructure laundering” to describe a sophisticated method used by cybercriminals to exploit legitimate cloud hosting services for illegal purposes.

This practice involves renting IP addresses from mainstream providers like Amazon Web Services (AWS) and Microsoft Azure, then mapping them to criminal websites through content delivery networks (CDNs) such as FUNNULL.

Despite efforts by these providers to block fraudulent accounts and IPs, the criminals’ rapid acquisition tactics continue to outpace enforcement.

- Advertisement - Google News

FUNNULL, a CDN linked to transnational organized crime groups, has reportedly rented over 1,200 IPs from AWS and nearly 200 from Microsoft.

Microsoft Azure
Map of FUNNULL CNAME Chains

While most of these have been taken down, new IPs are regularly acquired using stolen or fraudulent accounts.

Silent Push has identified FUNNULL’s infrastructure as hosting over 200,000 unique domains, primarily generated through Domain Generation Algorithms (DGAs), many of which are associated with phishing schemes, investment scams, and money laundering operations.

The Mechanics of Infrastructure Laundering

Unlike traditional “bulletproof hosting,” where servers resist takedown attempts by operating in jurisdictions with lax regulations, infrastructure laundering leverages legitimate cloud platforms to obscure illicit activities.

By embedding their operations within reputable hosting environments, threat actors gain a layer of legitimacy that complicates detection and mitigation.

This technique also ensures fast global access for their websites while making it challenging for defenders to block traffic without disrupting legitimate services hosted by the same providers.

Silent Push’s research highlights the use of CNAME mapping chains within FUNNULL’s CDN as a key tactic.

These chains link client domains to multiple IP addresses across different regions, creating a decentralized infrastructure that is difficult to track in real time.

Microsoft Azure
FUNNULL CDN IP addresses by geographic location

The criminals’ ability to repeatedly acquire new IPs underscores gaps in the monitoring and enforcement mechanisms of cloud providers.

Implications for Cloud Security and Regulation

The findings raise critical questions about the role of cloud providers in combating cybercrime.

Silent Push questions why major providers have not yet implemented real-time detection systems capable of identifying and blocking such activities at scale.

The report also emphasizes the need for closer scrutiny of third-party intermediaries who facilitate these operations, as well as stronger international collaboration to address the convergence of cybercrime and traditional organized crime.

Amazon responded to the report by denying any complicity and emphasizing its efforts to suspend fraudulent accounts linked to FUNNULL.

The company stated that it incurs damages from such activities and is committed to improving its detection capabilities.

However, Silent Push argues that more proactive measures are needed to prevent criminal networks from exploiting mainstream hosting services.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...