• Latest
  • Trending
  • All
  • News
Increased Abuse of Cloudflare R2 by Cybercriminals for Hosting Phishing Pages

Increased Abuse of Cloudflare R2 by Cybercriminals for Hosting Phishing Pages

August 17, 2023
Preparing for Quantum-Powered Attacks: A Guide for Businesses

Preparing for Quantum-Powered Attacks: A Guide for Businesses

October 2, 2023
The Impending Threat of 'Steal Now, Crack Later' Quantum Computing

The Impending Threat of ‘Steal Now, Crack Later’ Quantum Computing

September 25, 2023
The Dominance of Email as the Primary Attack Vector

The Dominance of Email as the Primary Attack Vector

September 18, 2023
Devastating Ransomware Attack Paralyzes Danish Cloud Provider

Devastating Ransomware Attack Paralyzes Danish Cloud Provider

September 11, 2023
The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

September 4, 2023
Understanding the GoAnywhere Data Breach and its Implications

Understanding the GoAnywhere Data Breach and its Implications

August 24, 2023
Safeguarding Your Identity: A Comprehensive Guide to Detecting Identity Theft

Safeguarding Your Identity: A Comprehensive Guide to Detecting Identity Theft

August 23, 2023
Identity Theft: Steps to Take in Case of a Breach

Identity Theft: Steps to Take in Case of a Breach

August 22, 2023
Enhancing Organizational Security Posture through Encryption: Key Tips

Enhancing Organizational Security Posture through Encryption: Key Tips

August 22, 2023

Understanding the Potential Threat of ‘Steal Now, Crack Later’ Attacks in Quantum Computing

August 21, 2023
Business Email Compromise Attack: A Costly Threat That Surpasses Ransomware Losses

Business Email Compromise Attack: A Costly Threat That Surpasses Ransomware Losses

August 21, 2023
The Challenges of Patching Vulnerabilities and the Importance of Prioritization

The Challenges of Patching Vulnerabilities and the Importance of Prioritization

August 20, 2023
  • About
  • Advertise
  • Privacy & Policy
  • Contact
26 °c
Ashburn
28 ° Thu
26 ° Fri
24 ° Sat
24 ° Sun
24 ° Mon
24 ° Tue
REPORT NEW Vulnerability
Tuesday, October 3, 2023
No Result
View All Result
  • Login
  • Register
Innocent Michael
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • News
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
Innocent Michael
No Result
View All Result
Home Threats

Increased Abuse of Cloudflare R2 by Cybercriminals for Hosting Phishing Pages

Cyber Intelligence by Cyber Intelligence
2 months ago
in Threats
247 8
A A
0
Increased Abuse of Cloudflare R2 by Cybercriminals for Hosting Phishing Pages
496
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

Recent findings by cybersecurity experts indicate that the use of Cloudflare R2 as a hosting platform for phishing pages has surged by 61 times in the past six months. Primarily targeting Microsoft login credentials, these phishing campaigns also encompass pages aimed at Adobe, Dropbox, and other popular cloud applications.

Cloudflare R2, a cloud-based data storage service analogous to Amazon Web Service S3, Google Cloud Storage, and Azure Blob Storage, has become a preferred choice for threat actors to carry out their malicious activities.

Related articles

The Impending Threat of 'Steal Now, Crack Later' Quantum Computing

The Impending Threat of ‘Steal Now, Crack Later’ Quantum Computing

1 week ago
1.4k
The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

4 weeks ago
1.4k

This worrisome trend coincides with a significant rise in the number of cloud applications linked to malware downloads, totaling 167. Notably, Microsoft OneDrive, Squarespace, GitHub, SharePoint, and Weebly have emerged as the top five sources. In an attempt to avoid detection, the phishing campaigns identified by Netskope not only leverage Cloudflare R2 to distribute static phishing pages but also exploit the company’s Turnstile offering, a CAPTCHA replacement. By doing so, they create anti-bot barriers that hinder online scanners like urlscan.io from accessing the phishing sites.

Interestingly, these malicious sites are designed to load content only under specific conditions, thereby evading detection even further. Netskope’s security researcher, Jan Michael, explains that the malicious website requires a referring site to include a timestamp after a hash symbol in the URL to display the actual phishing page. Conversely, the referring site relies on a phishing site passed on to it as a parameter. In cases where no URL parameter is provided to the referring site, visitors are automatically redirected to www.google.com.

This concerning development follows a previous disclosure by a cybersecurity company, which revealed details of a phishing campaign hosted on AWS Amplify. This campaign aimed to deceive users into providing their banking and Microsoft 365 credentials, as well as card payment details, by exploiting Telegram’s Bot API.

Share198Tweet124
Cyber Intelligence

Cyber Intelligence

Subscribe
Connect with
Login
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
Notify of
guest
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
guest
0 Comments
Inline Feedbacks
View all comments
Innocent Michael

Copyright © 2023 Inncent Michael.

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • News
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
  • Login
  • Sign Up
REPORT NEW Vulnerability

Welcome Back!

Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Update Contents