CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

Cybercriminals Abusing Cloudflare R2 for Hosting Phishing Pages, Experts Warn

admin by admin
August 16, 2023
in Information Security


Aug 15, 2023THNHosting / Phishing

Threat actors’ use of Cloudflare R2 to host phishing pages has witnessed a 61-fold increase over the past six months.

“The majority of the phishing campaigns target Microsoft login credentials, although there are some pages targeting Adobe, Dropbox, and other cloud apps,” Netskope security researcher Jan Michael said.

Cloudflare R2, analogous to Amazon Web Service S3, Google Cloud Storage, and Azure Blob Storage, is a data storage service for the cloud.

The development comes as the total number of cloud apps from which malware downloads originate has increased to 167, with Microsoft OneDrive, Squarespace, GitHub, SharePoint, and Weebly taking the top five spots.

Cybersecurity

The phishing campaigns identified by Netskope not only abuse Cloudflare R2 to distribute static phishing pages, but also leverage the company’s Turnstile offering, a CAPTCHA replacement, to place such pages behind anti-bot barriers to evade detection.

In doing so, it prevents online scanners like urlscan.io from reaching the actual phishing site, as the CAPTCHA test results in a failure.

As an additional layer of detection evasion, the malicious sites are designed to load the content only when certain conditions are met.

“The malicious website requires a referring site to include a timestamp after a hash symbol in the URL to display the actual phishing page,” Michael said. “On the other hand, the referring site requires a phishing site passed on to it as a parameter.”

In the event no URL parameter is passed to the referring site, visitors are redirected to www.google[.]com.

The development comes a month after the cybersecurity company disclosed details of a phishing campaign that was found hosting its bogus login pages in AWS Amplify to steal users’ banking and Microsoft 365 credentials, along with card payment details via Telegram’s Bot API.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

How to use AWS Verified Access logs to write and troubleshoot access policies

Next Post

How to automate the review and validation of permissions for users and groups in AWS IAM Identity Center

Related Posts

Information Security

FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies

by admin
October 1, 2023
Information Security

How AWS threat intelligence deters threat actors

by admin
October 1, 2023
Information Security

New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks

by admin
September 30, 2023
Information Security

Manage AWS Security Hub using CloudFormation

by admin
September 30, 2023
Information Security

Is that how it works? Hacking and scamming in popular TV shows

by admin
September 30, 2023
Next Post

How to automate the review and validation of permissions for users and groups in AWS IAM Identity Center

Recommended

The Breakthrough Innovation Best Practices ~ Future of CIO

October 1, 2023

FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies

October 1, 2023

How AWS threat intelligence deters threat actors

October 1, 2023

InnovationBreakthrough Chapter V Innovation Risk Management ~ Future of CIO

September 30, 2023

New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks

September 30, 2023

Manage AWS Security Hub using CloudFormation

September 30, 2023

© CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 CIO News Hubb All rights reserved.