TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Threat actor abuses Cloudflare tunnels to deliver remote access trojans

320 pointsby luu10 months ago

14 comments

peanut-walrus10 months ago
The times where malicious software was served from a sketchy .ru domain or a naked IP address located at some bullet-proof hosting provider are long gone. The threat actors use the same infra as everyone else - GCP, AWS, Azure, Cloudflare, etc.<p>They also use the same VPNs for connecting to your machines as your grandparents do for watching Netflix.<p>The internet as a whole is slowly but steadily moving towards a model where IP addresses and domain names are not useful indicators for security. You can not block your users from visiting Cloudflare or AWS IP ranges and you can not block visitors to your site from major commercial VPN providers.<p>In addition, all the traffic is encrypted, name lookups are encrypted, so a network operator can not tell anything about what you are doing on the internet.<p>This is a good thing for multiple reasons. First, it improves privacy and anonymity for the internet users. Second, reducing the effectiveness of network security solutions will make us be able to phase out their usage, which makes the network dumb again and prevents ossification. And third, it forces us to tackle the underlying security issues, rather than supporting a whole industry of ineffective whack-a-mole.
评论 #41143043 未加载
评论 #41146073 未加载
评论 #41146638 未加载
评论 #41143094 未加载
评论 #41149512 未加载
评论 #41140413 未加载
PhilipRoman10 months ago
Getting a bit tired of these headlines about malware &quot;delivery&quot; via link shorteners or similar. Yeah, guess what - people can host files on the internet in various ways, what a shocker.
评论 #41133674 未加载
评论 #41134306 未加载
评论 #41135200 未加载
评论 #41138916 未加载
neodymiumphish10 months ago
I actually wrote about malicious use of this very tool a year ago[0] (almost to the day). The only thing new here seems to be what they’re doing through the tunnels, and the apparent success they’re having with this method for it to increase as a proportion of their overall attack techniques.<p>TryCloudflare, IMO, is the real problem here. It doesn’t require an account at all, so attribution becomes nearly impossible.<p>0: <a href="https:&#x2F;&#x2F;www.guidepointsecurity.com&#x2F;blog&#x2F;tunnel-vision-cloudflared-abused-in-the-wild&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.guidepointsecurity.com&#x2F;blog&#x2F;tunnel-vision-cloudf...</a>
lemax10 months ago
Isn&#x27;t this what happens to every free quick tunnel product? Was kinda just waiting for this to play out. ngrok had nice zero friction tunneling when it came out but then they had to put everything behind a sign-up flow due to the same sort of abuse.
评论 #41134574 未加载
sebstefan10 months ago
If it isn&#x27;s Cloudflare tunnels, it&#x27;s gonna be asking google to translate some webpage you host with a payload in the URL or something<p>This isn&#x27;t news worthy
wiradikusuma10 months ago
I guess this is why we can&#x27;t have nice things on the internet (in this context, nice things from Cloudflare). Did you know you could send emails for free from Cloudflare (<a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;sending-email-from-workers-with-mailchannels" rel="nofollow">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;sending-email-from-workers-with-...</a>)? Well, now you couldn&#x27;t. The sunsetting probably was not Clouldflare&#x27;s fault, but it&#x27;s more or less similar: nice service, abused.
jasongill10 months ago
For a long time, Cloudflare had a feature where you could &quot;preview&quot; custom CSS and HTML intended for use with their custom error pages. Basically, the preview feature just took CSS and HTML in a query string and then displayed it on cloudflarepreview.com&#x2F;....<p>I reported it and showed how you could trivially create a page that said &quot;Sign in to your Cloudflare account to get access to the Cloudflare beta preview!&quot; and capture Cloudflare login credentials.<p>The bug bounty was closed as they said it was &quot;accepted as the nature of the cloudflarepreview playground&quot;.<p>Then they fixed it by adding a JWT token to the URL (and no bounty paid).<p>I&#x27;ve been a Cloudflare customer for a long time but it seems that there are many dark corners of their products that just don&#x27;t get a lot of attention until they are abused, and I suspect this TryCloudflare thing is one of them.
Terr_10 months ago
When it comes to &quot;nobody wants to spend enough money to do moderation and anti-abuse well&quot;, it makes me wonder: Whatever happened to early PGP-era ideas that we&#x27;d somehow establish new webs of distributed trust and distrust of online identities?<p>I guess we <i>sorta kinda</i> have a little of that in the form of social-media accounts that get &quot;trusted&quot; based on the number of followers and their followers&#x27; followers and bots all the way down, etc. Or PageRank and SEO exploitation.
评论 #41138440 未加载
评论 #41138468 未加载
xyst10 months ago
I wonder if those dreaded endpoint security programs (ie, ClownStrike) would have picked up on this type of attack.<p>I guess this type of traffic would only get flagged if attackers were skids (ie, re-using known RATs)
评论 #41135587 未加载
评论 #41134116 未加载
rolph10 months ago
this reminds me of when those AOL free trial account disks were all over the place. in many circles an AOL subdomain would get instabanned
评论 #41133557 未加载
lacoolj10 months ago
My immediate internal spam&#x2F;scam alarm goes off the moment I see &quot;I hope this message finds you well&quot;
edm0nd10 months ago
Crimeflare strikes again.
anonym2910 months ago
Cloudflare has been infamous among sysadmins and threat hunters for over a decade [1,2] now for having an almost-nonexistent moderation program. Their services have been routinely abused by malicious actors for years [3,4,5,6,7] They&#x27;ve arguably been the single largest commercial provider for criminals globally over that time period, including non-tech criminals like drug traffickers and actual terrorists [8,9], to say nothing of aiding and abetting war criminals [10].<p>In fact, Cloudflare is actually the second largest DNS provider in the world by number of domains served. [11]<p>They are in a position to log and analyze all of the traffic they decrypt, including all of the plaintext POST data, all of the cookies, all of the origin IPs, L7 payload sizes, and traffic timestamps for over 35 million websites.<p>Their extensive history of indiscriminately offering &quot;free&quot; services to evildoers likely ties back to their true purpose, which Matthew Prince has admitted to [12], which is to sell all of those passwords, all of that PII, all of your privacy, not only to the US government, but also to other bidders.<p>It is no exaggeration to say that anyone opposed to spam, phishing, malware, cybercrime, terrorism, war crimes, government surveillance dragnets, and infringements upon one&#x27;s own digital privacy should have nothing but utter contempt for the soulless monsters responsible for this corporate atrocity.<p>If you are as passionate about the subject as I am after reading some of these citations, I&#x27;d encourage you to boycott any websites using CF that you don&#x27;t <i>need</i> to visit, and make plenty of phone calls to California senators, representatives, and the governor demanding that the state of California revoke Cloudflare&#x27;s corporate charter and right to conduct business in the state.<p>[1] <a href="https:&#x2F;&#x2F;www.malwarebytes.com&#x2F;blog&#x2F;news&#x2F;2014&#x2F;12&#x2F;free-ssl-certificate-from-cloudflare-abused-in-phishing-scam" rel="nofollow">https:&#x2F;&#x2F;www.malwarebytes.com&#x2F;blog&#x2F;news&#x2F;2014&#x2F;12&#x2F;free-ssl-cert...</a><p>[2] <a href="https:&#x2F;&#x2F;forum.spamcop.net&#x2F;topic&#x2F;14194-cloudflare-bulletproof-spammer-hosting&#x2F;" rel="nofollow">https:&#x2F;&#x2F;forum.spamcop.net&#x2F;topic&#x2F;14194-cloudflare-bulletproof...</a><p>[3] <a href="https:&#x2F;&#x2F;thehackernews.com&#x2F;2023&#x2F;08&#x2F;cybercriminals-abusing-cloudflare-r2.html" rel="nofollow">https:&#x2F;&#x2F;thehackernews.com&#x2F;2023&#x2F;08&#x2F;cybercriminals-abusing-clo...</a><p>[4] <a href="https:&#x2F;&#x2F;www.threatdown.com&#x2F;blog&#x2F;cloudflare-tunnel-increasingly-abused-by-cybercriminals&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.threatdown.com&#x2F;blog&#x2F;cloudflare-tunnel-increasing...</a><p>[5] <a href="https:&#x2F;&#x2F;any.run&#x2F;cybersecurity-blog&#x2F;clouflare-phishing-campaign&#x2F;" rel="nofollow">https:&#x2F;&#x2F;any.run&#x2F;cybersecurity-blog&#x2F;clouflare-phishing-campai...</a><p>[6] <a href="https:&#x2F;&#x2F;venturebeat.com&#x2F;security&#x2F;rogue-ad-network-site-likely-infected-thousands-of-users-still-operational&#x2F;" rel="nofollow">https:&#x2F;&#x2F;venturebeat.com&#x2F;security&#x2F;rogue-ad-network-site-likel...</a><p>[7] <a href="https:&#x2F;&#x2F;portswigger.net&#x2F;daily-swig&#x2F;cybercriminals-use-reverse-tunneling-and-url-shorteners-to-launch-virtually-undetectable-phishing-campaigns" rel="nofollow">https:&#x2F;&#x2F;portswigger.net&#x2F;daily-swig&#x2F;cybercriminals-use-revers...</a><p>[8] <a href="https:&#x2F;&#x2F;www.trendmicro.com&#x2F;vinfo&#x2F;us&#x2F;security&#x2F;news&#x2F;cybercrime-and-digital-threats&#x2F;overlapping-technologies-cybercriminals-and-terrorist-organizations" rel="nofollow">https:&#x2F;&#x2F;www.trendmicro.com&#x2F;vinfo&#x2F;us&#x2F;security&#x2F;news&#x2F;cybercrime...</a><p>[9] <a href="https:&#x2F;&#x2F;cyberscoop.com&#x2F;cloudflare-ipo-terrorism-narcotics&#x2F;" rel="nofollow">https:&#x2F;&#x2F;cyberscoop.com&#x2F;cloudflare-ipo-terrorism-narcotics&#x2F;</a><p>[10] <a href="https:&#x2F;&#x2F;www.timesofisrael.com&#x2F;us-firm-helps-hamas-netanyahu-keep-hackers-at-bay&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.timesofisrael.com&#x2F;us-firm-helps-hamas-netanyahu-...</a><p>[11] <a href="https:&#x2F;&#x2F;bgp.he.net&#x2F;report&#x2F;tophosts" rel="nofollow">https:&#x2F;&#x2F;bgp.he.net&#x2F;report&#x2F;tophosts</a><p>[12] <a href="https:&#x2F;&#x2F;0xacab.org&#x2F;blockedbyriseup&#x2F;deCloudflare&#x2F;-&#x2F;raw&#x2F;master&#x2F;image&#x2F;federalinterest.jpg" rel="nofollow">https:&#x2F;&#x2F;0xacab.org&#x2F;blockedbyriseup&#x2F;deCloudflare&#x2F;-&#x2F;raw&#x2F;master...</a>
评论 #41140144 未加载
评论 #41136757 未加载
评论 #41136715 未加载
dang10 months ago
[stub for offtopicness. title casing software begs forgiveness.]
评论 #41132730 未加载
评论 #41132423 未加载
评论 #41132504 未加载
评论 #41132426 未加载