Cybercriminals recurrently abuse free providers to host malware or to arrange command-and-control (C2) infrastructure as a result of they know connections to such providers gained’t increase suspicion inside networks. Such is the case with TryCloudflare.com, which was just lately abused in a widespread marketing campaign to ship distant entry trojans (RATs).
TryCloudflare is a tunneling function that permits customers to proxy visitors by way of Cloudflare’s content material supply community. The latest campaigns, independently noticed this yr and reported this week by researchers from safety corporations Proofpoint and eSentire, concerned phishing emails that resulted within the obtain of a number of malware households, together with XWorm, VenomRAT, PureLogs Stealer, AsyncRAT, GuLoader and Remcos.
“Marketing campaign message volumes vary from lots of to tens of 1000’s of messages impacting dozens to 1000’s of organizations globally,” researchers from Proofpoint wrote of their report. “Along with English, researchers noticed French, Spanish, and German language lures. […] Lure themes differ, however usually embody business-relevant subjects like invoices, doc requests, package deal deliveries and taxes.”