New Phishing Campaign Exploits Cloudflare Workers And HTML Smuggling To Steal User Credentials


(MENAFN- EIN Presswire)

DUBAI, UNITED ARAB EMIRATE, June 12, 2024 /EINPresswire / -- ANY reports that a new sophisticated phishing campaign is active in the wild, targeting users in Asia, North America, and Southern Europe.

The campaign exploits Cloudflare Workers and HTML smuggling techniques to steal user credentials from popular services such as Microsoft, Gmail, Yahoo!, and cPanel Webmail.

The phishing attack uses a unique approach where the malicious payload is a phishing page itself, reconstructed and presented to the user in their web browser.

Hackers prompt victims to sign in with their Microsoft Outlook or Microsoft 365 account, claiming that they need to do so to view a supposed PDF document. The fake sign-in pages, hosted on Cloudflare Workers, harvest not only login information but also MFA codes, researchers who analyzed the campaign say.

The phishing page is built using a modified version of an open-source Cloudflare Adversary in the Middle (AitM) toolkit.

When the victim visits the spoofed login page, the attacker collects web request metadata, redirects the victim to the legitimate site, and then collects tokens and cookies from the response, allowing them to track the victim's actions after logging in.

ANY team warns that phishing campaigns are becoming increasingly sophisticated, employing an array of well-known and new phishing tools, such as:

● Phishing-as-a-Service toolkits like Greatness to steal Microsoft 365 login credentials and circumvent MFA
● DNS tunneling to detect when victims interact with phishing content
● GenAI to write convincing phishing emails
● QR codes inside PDF files to redirect victims to fake login pages
● Real CAPTCHAs placed in front of malicious content to prevent automated detection
● Realistic sign-in forms that mimic popular services

Read more about how these phishing tactics work in ANY's blog post .

Veronika Trifonova
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
X
YouTube

MENAFN12062024003118003196ID1108323960


EIN Presswire

Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.