Cloudflare’s free tunnels plagued by RATs and other malware, researchers warn
Cybercriminals have found a no-cost professional infrastructure to perform their attacks and deliver malware. It’s Cloudflare’s free tier tunnel service, which is supposed to protect legitimate web services.
Cybersecurity company Proofpoint has observed malicious actors increasingly delivering remote access trojans (RATs) via TryCloudflare Tunnel abuse. Tunnels are a way to remotely access data and resources on a remote server, similar to a VPN. TryCloudflare offers to create them with a single command without an account.
The volume of messages in a single malicious campaign ranges from hundreds to tens of thousands, and cybercriminals impact thousands of organizations globally.
In July alone, cybercrooks launched at least 26 campaigns, observed by Proofpoint, delivering trojans like XWorm or AsyncRat.
“The activity abuses the TryCloudflare feature that allows an attacker to create a one-time tunnel without creating an account,” the report reads.
“The threat activity set behind the campaigns has modified tactics, techniques, and procedures in attempts to bypass detection and improve efficiency.”
A cluster of criminal activity appears to sprout from a single financially motivated threat actor. However, Proofpoint hasn’t attributed it to any tracked malicious group.
Here’s how it works: In most campaigns, victims receive messages with links or attachments that lead to an internet shortcut (URL) file. Some messages were tax-themed, targeting law, finance, manufacturing, and technology organizations, others included other business-relevant topics, such as invoices, document requests, or package deliveries.
Cybercriminals used English, French, Spanish, and German language lures.
The user, if they click the link or open the attachment, is then redirected to a remote LNK file, usually hosted on TryCloudflare. LNK is a shortcut file that usually points to other files or programs. Threat actors use them to execute CMD or BAT scripts, which then deliver the malicious payload.
In other cases, instead of LNK, hackers used VBS executables which deliver similar outcomes.
The attack chain requires significant victim interaction in order to detonate the final payload, including clicking on the malicious link, double clicking on multiple files such as the LNK or VBS files, and unzipping compressed scripts. This gives the recipient multiple opportunities to identify suspicious activity and disrupt the attack chain before successful execution.
“Cloudflare tunnels provide the threat actors a way to use temporary infrastructure to scale their operations providing flexibility to build and take down instances in a timely manner. This makes it harder for defenders and traditional security measures such as relying on static blocklists,” the report reads.
Cloudflare’s abuse management and prevention policies were questioned recently by the non-profit organization Spamhaus Project. The watchdog said that cybercriminals exploit Cloudflare services, and the abuse reports remain unresolved.
Back to News & ResourcesRelated news
Book a free online consultation
We love talking to businesses and understanding what they do and what they need. If you'd like to book a short, no obligation consultation, please provide us with your details. We understand that you may already have an IT company, consultant or team, so all contacts are treated as completely confidential. A fresh new IT approach could begin here...
Keep connected
Newsletter signup
News & Resources
Get latest updates, downloads and white papers.