August 1st, 2024

Threat Actor Abuses Cloudflare Tunnels to Deliver Rats

Proofpoint reported increased cybercriminal activity using Cloudflare Tunnels to deliver malware, particularly remote access trojans. Campaigns involve phishing emails and exploit temporary tunnels, necessitating adaptive cybersecurity defenses.

Read original articleLink Icon
FrustrationSkepticismContempt
Threat Actor Abuses Cloudflare Tunnels to Deliver Rats

Proofpoint has reported an increase in cybercriminal activity utilizing Cloudflare Tunnels to deliver malware, specifically remote access trojans (RATs). This tactic, first observed in February 2024, has gained momentum, particularly between May and July 2024, with campaigns primarily distributing Xworm, AsyncRAT, VenomRAT, GuLoader, and Remcos. Attackers exploit the TryCloudflare feature, allowing them to create temporary tunnels for remote access without account creation. Campaigns typically involve phishing emails containing URLs or attachments that lead to malicious files, which, when executed, download and install malware through a series of scripts.

The volume of these campaigns has varied significantly, impacting numerous organizations globally, with messages often themed around business topics like invoices and package deliveries. The threat actors have adapted their tactics over time, incorporating obfuscation in their scripts to evade detection. The use of Python scripts for malware delivery is notable, as it allows the installation of malware on systems without Python pre-installed.

The attack chain requires significant user interaction, providing multiple opportunities for detection before the final payload is executed. Proofpoint emphasizes the need for organizations to restrict access to external file-sharing services and to monitor for suspicious activity. The evolving tactics of these threat actors highlight the challenges in cybersecurity, necessitating adaptive defenses to counteract such sophisticated attacks.

Related

The Growing Threat of Malware Concealed Behind Cloud Services

The Growing Threat of Malware Concealed Behind Cloud Services

Cybersecurity threats evolve with malware operators using cloud services like UNSTABLE and Condi botnets. FortiGuard Labs advises enhancing cloud security defenses to combat growing cybercriminal activities effectively.

Threat actors quick to weaponize PoC exploits; 6.8% of all internet traffic DDoS

Threat actors quick to weaponize PoC exploits; 6.8% of all internet traffic DDoS

Hackers exploit PoC exploits within 22 minutes of release, leaving little time for defense. Cloudflare advises using AI for quick detection rules. DDoS attacks contribute to 6.8% of daily internet traffic, rising to 12% during major events.

Cloudflare reports almost 7% of internet traffic is malicious

Cloudflare reports almost 7% of internet traffic is malicious

Cloudflare's report highlights a 7% increase in malicious internet traffic, linked to global events. Urges prompt vulnerability patching, emphasizes DDoS attacks, API security risks, and the need for proactive defense strategies.

Cloudflare reports almost 7% of internet traffic is malicious

Cloudflare reports almost 7% of internet traffic is malicious

Cloudflare's report highlights a rise in malicious internet traffic, driven by global events. It emphasizes the need for timely patching against new vulnerabilities, notes a surge in DDoS attacks, stresses API security, and warns about harmful bot traffic. Organizations are urged to adopt robust security measures.

Hackers bypass Windows SmartScreen flaw to launch malware

Hackers bypass Windows SmartScreen flaw to launch malware

Cybercriminals are exploiting a Microsoft Defender vulnerability (CVE-2024-21412) to install malware undetected. Many systems remain unpatched, making them vulnerable. Users should update Windows and be cautious with email attachments.

AI: What people are saying
The comments reflect a range of opinions on the misuse of Cloudflare Tunnels for cybercriminal activities.
  • Many commenters express frustration with the increasing abuse of legitimate services like Cloudflare for malicious purposes.
  • There is a consensus that traditional indicators of security, such as IP addresses and domain names, are becoming less effective.
  • Some users highlight the challenges of attribution and moderation in the context of free services that allow anonymous usage.
  • Several comments reference past experiences with similar services being exploited, indicating a pattern of abuse.
  • Criticism is directed at Cloudflare for its perceived lack of action against malicious actors using its infrastructure.
Link Icon 15 comments
By @peanut-walrus - 6 months
The times where malicious software was served from a sketchy .ru domain or a naked IP address located at some bullet-proof hosting provider are long gone. The threat actors use the same infra as everyone else - GCP, AWS, Azure, Cloudflare, etc.

They also use the same VPNs for connecting to your machines as your grandparents do for watching Netflix.

The internet as a whole is slowly but steadily moving towards a model where IP addresses and domain names are not useful indicators for security. You can not block your users from visiting Cloudflare or AWS IP ranges and you can not block visitors to your site from major commercial VPN providers.

In addition, all the traffic is encrypted, name lookups are encrypted, so a network operator can not tell anything about what you are doing on the internet.

This is a good thing for multiple reasons. First, it improves privacy and anonymity for the internet users. Second, reducing the effectiveness of network security solutions will make us be able to phase out their usage, which makes the network dumb again and prevents ossification. And third, it forces us to tackle the underlying security issues, rather than supporting a whole industry of ineffective whack-a-mole.

By @PhilipRoman - 6 months
Getting a bit tired of these headlines about malware "delivery" via link shorteners or similar. Yeah, guess what - people can host files on the internet in various ways, what a shocker.
By @neodymiumphish - 6 months
I actually wrote about malicious use of this very tool a year ago[0] (almost to the day). The only thing new here seems to be what they’re doing through the tunnels, and the apparent success they’re having with this method for it to increase as a proportion of their overall attack techniques.

TryCloudflare, IMO, is the real problem here. It doesn’t require an account at all, so attribution becomes nearly impossible.

0: https://www.guidepointsecurity.com/blog/tunnel-vision-cloudf...

By @lemax - 6 months
Isn't this what happens to every free quick tunnel product? Was kinda just waiting for this to play out. ngrok had nice zero friction tunneling when it came out but then they had to put everything behind a sign-up flow due to the same sort of abuse.
By @sebstefan - 6 months
If it isn's Cloudflare tunnels, it's gonna be asking google to translate some webpage you host with a payload in the URL or something

This isn't news worthy

By @wiradikusuma - 6 months
I guess this is why we can't have nice things on the internet (in this context, nice things from Cloudflare). Did you know you could send emails for free from Cloudflare (https://blog.cloudflare.com/sending-email-from-workers-with-...)? Well, now you couldn't. The sunsetting probably was not Clouldflare's fault, but it's more or less similar: nice service, abused.
By @jasongill - 6 months
For a long time, Cloudflare had a feature where you could "preview" custom CSS and HTML intended for use with their custom error pages. Basically, the preview feature just took CSS and HTML in a query string and then displayed it on cloudflarepreview.com/....

I reported it and showed how you could trivially create a page that said "Sign in to your Cloudflare account to get access to the Cloudflare beta preview!" and capture Cloudflare login credentials.

The bug bounty was closed as they said it was "accepted as the nature of the cloudflarepreview playground".

Then they fixed it by adding a JWT token to the URL (and no bounty paid).

I've been a Cloudflare customer for a long time but it seems that there are many dark corners of their products that just don't get a lot of attention until they are abused, and I suspect this TryCloudflare thing is one of them.

By @Terr_ - 6 months
When it comes to "nobody wants to spend enough money to do moderation and anti-abuse well", it makes me wonder: Whatever happened to early PGP-era ideas that we'd somehow establish new webs of distributed trust and distrust of online identities?

I guess we sorta kinda have a little of that in the form of social-media accounts that get "trusted" based on the number of followers and their followers' followers and bots all the way down, etc. Or PageRank and SEO exploitation.

By @xyst - 6 months
I wonder if those dreaded endpoint security programs (ie, ClownStrike) would have picked up on this type of attack.

I guess this type of traffic would only get flagged if attackers were skids (ie, re-using known RATs)

By @rolph - 6 months
this reminds me of when those AOL free trial account disks were all over the place. in many circles an AOL subdomain would get instabanned
By @lacoolj - 6 months
My immediate internal spam/scam alarm goes off the moment I see "I hope this message finds you well"
By @edm0nd - 6 months
Crimeflare strikes again.
By @anonym29 - 6 months
Cloudflare has been infamous among sysadmins and threat hunters for over a decade [1,2] now for having an almost-nonexistent moderation program. Their services have been routinely abused by malicious actors for years [3,4,5,6,7] They've arguably been the single largest commercial provider for criminals globally over that time period, including non-tech criminals like drug traffickers and actual terrorists [8,9], to say nothing of aiding and abetting war criminals [10].

In fact, Cloudflare is actually the second largest DNS provider in the world by number of domains served. [11]

They are in a position to log and analyze all of the traffic they decrypt, including all of the plaintext POST data, all of the cookies, all of the origin IPs, L7 payload sizes, and traffic timestamps for over 35 million websites.

Their extensive history of indiscriminately offering "free" services to evildoers likely ties back to their true purpose, which Matthew Prince has admitted to [12], which is to sell all of those passwords, all of that PII, all of your privacy, not only to the US government, but also to other bidders.

It is no exaggeration to say that anyone opposed to spam, phishing, malware, cybercrime, terrorism, war crimes, government surveillance dragnets, and infringements upon one's own digital privacy should have nothing but utter contempt for the soulless monsters responsible for this corporate atrocity.

If you are as passionate about the subject as I am after reading some of these citations, I'd encourage you to boycott any websites using CF that you don't need to visit, and make plenty of phone calls to California senators, representatives, and the governor demanding that the state of California revoke Cloudflare's corporate charter and right to conduct business in the state.

[1] https://www.malwarebytes.com/blog/news/2014/12/free-ssl-cert...

[2] https://forum.spamcop.net/topic/14194-cloudflare-bulletproof...

[3] https://thehackernews.com/2023/08/cybercriminals-abusing-clo...

[4] https://www.threatdown.com/blog/cloudflare-tunnel-increasing...

[5] https://any.run/cybersecurity-blog/clouflare-phishing-campai...

[6] https://venturebeat.com/security/rogue-ad-network-site-likel...

[7] https://portswigger.net/daily-swig/cybercriminals-use-revers...

[8] https://www.trendmicro.com/vinfo/us/security/news/cybercrime...

[9] https://cyberscoop.com/cloudflare-ipo-terrorism-narcotics/

[10] https://www.timesofisrael.com/us-firm-helps-hamas-netanyahu-...

[11] https://bgp.he.net/report/tophosts

[12] https://0xacab.org/blockedbyriseup/deCloudflare/-/raw/master...

By @dang - 6 months
[stub for offtopicness. title casing software begs forgiveness.]