cloudflare tunnels rat deployment

As cybercriminals increasingly turn to sophisticated tactics, the exploitation of Cloudflare‘s free TryCloudflare Tunnel feature has emerged as a significant threat. This method allows malicious actors to gain unauthorized access by sending phishing emails disguised as legitimate invoices or tax documents. These emails often contain attachments with low-risk file types, such as “application/windows-library+xml,” designed to bypass email security filters. Detection rules have been implemented to combat these tactics, but their effectiveness is continually challenged.

The cybercriminals initiate payload execution through deceptive LNK files that trigger HTML Applications (HTA) utilizing VBScript. By establishing connections to WebDAV resources hosted in Cloudflare’s infrastructure, attackers can deploy multi-stage payloads, primarily targeting Remote Access Trojans (RATs). Notable examples of these RATs include AsyncRAT, GuLoader, and Remcos. The malicious software can operate through in-memory execution, thereby evading persistent detection. This campaign has been dubbed Serpentine#Cloud due to its active and ongoing nature.

Organizations in manufacturing, technology, finance, and legal sectors frequently find themselves on the wrong end of these attacks. The targeting of these high-value sectors suggests a clear financial motivation, as these industries rely heavily on the timely processing of invoices and tax-related documents. Cybercriminals have reportedly sent over 1,500 phishing messages across various industries, ensuring that they capitalize on any opportunities to release their attacks. With social engineering tricks contributing to 98% of cyberattacks, these phishing campaigns prove particularly effective at compromising organizational security.

However, the use of Cloudflare tunnel subdomains provides attackers with a veneer of legitimacy, complicating detection efforts. Obfuscated scripts, such as BAT and PowerShell, are utilized to hide malicious actions, making traditional signature-based detection systems less effective. As sophisticated evasion techniques develop, Cloudflare’s machine learning-based detection capabilities struggle to keep pace with the evolving environment of cyber threats.

Since the initial observations of these tactics in February 2024, the campaigns have continued, demonstrating a troubling persistence and adaptability among malicious actors.

You May Also Like

Elite CFOs Lured by Realistic Job Offer in Global Phishing Campaign Using Legitimate Access Tool

CFOs are the prime target in a cunning phishing trap—could your organization be next? Learn the chilling tactics behind this global deception.

Elite US and EU Figures Hit by Silent Imessage Attacks Few Ever Notice Until It’S Too Late

Elite figures across the US and EU are unknowingly vulnerable to stealthy iMessage attacks that evade detection. Are you next?

Phishing Scam Disguised as OneNote Hijacks Office365 and Outlook Logins

Beware of the latest phishing scheme posing as OneNote! It’s more insidious than you think—can your login withstand the next attack?

Google Links Turned Against Users: How Hackers Hide Phishing Attacks Behind Trusted Domains

Think you can trust links from Google? Cybercriminals are exploiting this trust to launch devastating phishing attacks. Learn how to protect yourself from becoming a victim.