Wednesday, April 16, 2025
HomeCyber AttackHackers Exploit Cloudflare for Advanced Phishing Attacks

Hackers Exploit Cloudflare for Advanced Phishing Attacks

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing the abuse of Cloudflare services and Telegram for malicious purposes.

Researchers at Hunt.io have identified this new wave of attacks, which employs Cloudflare-branded phishing pages and advanced tactics to evade detection.

The campaign utilizes Cloudflare’s Pages.dev and Workers.dev platforms typically used for legitimate static website hosting and serverless JavaScript execution to deliver phishing lures.

- Advertisement - Google News

These phishing pages impersonate Digital Millennium Copyright Act (DMCA) takedown notices, pressuring victims into downloading malicious files disguised as PDFs.

Phishing Attacks
Example phishing page.

The attackers exploit the “search-ms” protocol to initiate downloads of Windows shortcut (.lnk) files that trigger a malware infection chain upon execution.

Phishing Infrastructure and Infection Chain

The phishing lures direct victims to domains hosted on Cloudflare infrastructure, such as “pages.dev” and “workers.dev,” where clicking on a “Get Document” button initiates the infection process.

The malicious .lnk file, disguised as a PDF, executes a PowerShell script that downloads additional payloads from an open directory hosted on a compromised server.

This includes a ZIP archive containing Python-based malware and a legitimate Python executable.

Once extracted, the malware establishes persistence by creating shortcuts in the Windows startup folder and communicates with Pyramid Command-and-Control (C2) servers.

Researchers noted incremental changes in the malware’s delivery mechanism, including obfuscation techniques to frustrate analysis.

For instance, configuration data in the Python script is now encoded with additional junk characters before being decoded.

Despite these modifications, the overall infection logic remains consistent with earlier campaigns linked to the same actor.

Telegram Integration for Enhanced Targeting

A notable evolution in this campaign is the integration of Telegram for victim tracking.

The malware uses a PowerShell script to send the external IP address of infected hosts to an attacker-operated Telegram bot.

This is achieved via hardcoded bot tokens and chat IDs embedded in the script.

The Telegram group associated with this activity, titled “ПШ КОД ЗАПУСК” (translated as “PS CODE LAUNCH”), appears to coordinate operations among several members, including an administrator and bot operator.

Phishing Attacks
Screenshot from Telegram of the group tied to the malicious phishing attack.

Despite their technical sophistication, the attackers continue to exhibit operational security (OPSEC) lapses, such as leaving open directories exposed on their servers.

These directories reveal details about their infrastructure and malware components, enabling researchers to map their activities.

Over 20 domains leveraging these open directories have been identified, further exposing the scale of the operation.

This campaign underscores the abuse of trusted services like Cloudflare and Telegram by cybercriminals to mask their operations and evade detection.

The use of legitimate platforms not only lends credibility to phishing pages but also complicates efforts to identify malicious activity.

Additionally, the exploitation of protocol handlers like “search-ms” highlights gaps in endpoint monitoring that attackers continue to exploit.

Security teams are advised to monitor for signs of abuse involving Cloudflare domains and protocol handlers while remaining vigilant against open directories serving malicious payloads.

Integrating DevOps Security practices can further strengthen detection and response capabilities, especially in monitoring CI/CD pipelines and infrastructure configurations.

Enhanced scrutiny of Telegram-based communications may also aid in identifying emerging threats.

As this threat actor evolves its tactics, organizations must adapt their defenses accordingly to mitigate risks posed by increasingly sophisticated phishing campaigns.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing...

10 Best Email Security Solutions in 2025

Email security solutions are critical for protecting organizations from the growing sophistication of cyber...

WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack

A new form of phishing attack is making waves among job seekers, as cybercriminals...

SOC Alert Fatigue Hits Peak Levels As Teams Battle Notification Overload

Security Operations Centers (SOCs) are facing a mounting crisis: alert fatigue. As cyber threats...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 9 New ICS Advisories Addressing Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing...

10 Best Email Security Solutions in 2025

Email security solutions are critical for protecting organizations from the growing sophistication of cyber...

WhatsApp Job Offer Scam Targets Job Seekers in New Phishing Attack

A new form of phishing attack is making waves among job seekers, as cybercriminals...