Cyber Security News

Hackers Exploit Cloudflare for Advanced Phishing Attacks

A sophisticated phishing campaign orchestrated by a Russian-speaking threat actor has been uncovered, revealing the abuse of Cloudflare services and Telegram for malicious purposes.

Researchers at Hunt.io have identified this new wave of attacks, which employs Cloudflare-branded phishing pages and advanced tactics to evade detection.

The campaign utilizes Cloudflare’s Pages.dev and Workers.dev platforms typically used for legitimate static website hosting and serverless JavaScript execution to deliver phishing lures.

These phishing pages impersonate Digital Millennium Copyright Act (DMCA) takedown notices, pressuring victims into downloading malicious files disguised as PDFs.

Example phishing page.

The attackers exploit the “search-ms” protocol to initiate downloads of Windows shortcut (.lnk) files that trigger a malware infection chain upon execution.

Phishing Infrastructure and Infection Chain

The phishing lures direct victims to domains hosted on Cloudflare infrastructure, such as “pages.dev” and “workers.dev,” where clicking on a “Get Document” button initiates the infection process.

The malicious .lnk file, disguised as a PDF, executes a PowerShell script that downloads additional payloads from an open directory hosted on a compromised server.

This includes a ZIP archive containing Python-based malware and a legitimate Python executable.

Once extracted, the malware establishes persistence by creating shortcuts in the Windows startup folder and communicates with Pyramid Command-and-Control (C2) servers.

Researchers noted incremental changes in the malware’s delivery mechanism, including obfuscation techniques to frustrate analysis.

For instance, configuration data in the Python script is now encoded with additional junk characters before being decoded.

Despite these modifications, the overall infection logic remains consistent with earlier campaigns linked to the same actor.

Telegram Integration for Enhanced Targeting

A notable evolution in this campaign is the integration of Telegram for victim tracking.

The malware uses a PowerShell script to send the external IP address of infected hosts to an attacker-operated Telegram bot.

This is achieved via hardcoded bot tokens and chat IDs embedded in the script.

The Telegram group associated with this activity, titled “ПШ КОД ЗАПУСК” (translated as “PS CODE LAUNCH”), appears to coordinate operations among several members, including an administrator and bot operator.

Screenshot from Telegram of the group tied to the malicious phishing attack.

Despite their technical sophistication, the attackers continue to exhibit operational security (OPSEC) lapses, such as leaving open directories exposed on their servers.

These directories reveal details about their infrastructure and malware components, enabling researchers to map their activities.

Over 20 domains leveraging these open directories have been identified, further exposing the scale of the operation.

This campaign underscores the abuse of trusted services like Cloudflare and Telegram by cybercriminals to mask their operations and evade detection.

The use of legitimate platforms not only lends credibility to phishing pages but also complicates efforts to identify malicious activity.

Additionally, the exploitation of protocol handlers like “search-ms” highlights gaps in endpoint monitoring that attackers continue to exploit.

Security teams are advised to monitor for signs of abuse involving Cloudflare domains and protocol handlers while remaining vigilant against open directories serving malicious payloads.

Integrating DevOps Security practices can further strengthen detection and response capabilities, especially in monitoring CI/CD pipelines and infrastructure configurations.

Enhanced scrutiny of Telegram-based communications may also aid in identifying emerging threats.

As this threat actor evolves its tactics, organizations must adapt their defenses accordingly to mitigate risks posed by increasingly sophisticated phishing campaigns.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Gcore Super Transit Brings Advanced DDoS Protection and Acceleration for Superior Enterprise Security and Speed

Gcore, the global edge AI, cloud, network, and security solutions provider, has launched Super Transit,…

3 hours ago

Windows Active Directory Vulnerability Enables Unauthorized Privilege Escalation

Microsoft has urgently patched a high-risk security vulnerability (CVE-2025-29810) in Windows Active Directory Domain Services…

3 hours ago

Adobe Security Update: Patches Released for Multiple Product Vulnerabilities

Adobe has announced critical security updates for several of its popular software products, addressing vulnerabilities…

3 hours ago

HollowQuill Malware Targets Government Agencies Globally Through Weaponized PDF Documents

In a disturbing escalation of cyber threats, a new malware campaign dubbed 'HollowQuill' has been…

4 hours ago

New Mirai Botnet Variant Exploits TVT DVRs to Gain Admin Control

GreyNoise has noted a sharp escalation in hacking attempts targeting TVT NVMS9000 Digital Video Recorders…

5 hours ago

CISA Alerts on Active Exploitation of CentreStack Hard-Coded Key Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert highlighting a critical vulnerability…

5 hours ago