The attacks, which began emerging in early 2025, leverage Cloudflare Workers and Pages to host malicious content that easily bypasses traditional security filters due to the trusted nature of Cloudflare’s infrastructure. Cybersecurity experts have identified a troubling new trend where threat actors are exploiting legitimate Cloudflare services to orchestrate highly convincing phishing campaigns. Hunt.io security researchers identified this campaign after observing a 43% increase in phishing incidents utilizing trusted cloud infrastructure over the past quarter. This technique allows attackers to maintain persistence while evading detection, as the phishing infrastructure leverages Cloudflare’s legitimate reputation and robust infrastructure to remain operational. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Traditional security solutions often whitelist Cloudflare resources, allowing malicious content to slip through defenses. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. The attackers further enhance the deception by implementing precise replicas of legitimate login interfaces, complete with corporate branding and expected functionality that creates a seamless illusion of authenticity. The attackers deploy sophisticated JavaScript code within Cloudflare Workers that dynamically generates phishing pages tailored to each victim. The attack chain begins when victims receive seemingly legitimate emails containing links to what appear to be authentic login portals. These sophisticated campaigns primarily target financial institutions and technology companies, with victims reporting credential theft and subsequent unauthorized access to sensitive systems. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. The widespread adoption of Cloudflare across legitimate business websites creates a perfect environment for these attacks to flourish.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 03 Apr 2025 11:20:15 +0000