Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Cloudflare to Target Microsoft 365 Users

Hackers Exploit Cloudflare to Target Microsoft 365 Users

Posted on March 12, 2026 By CWS

A sophisticated cyberattack campaign has been uncovered, where threat actors are exploiting Cloudflare’s security features to clandestinely harvest Microsoft 365 credentials. This campaign highlights a concerning trend where attackers turn protective technologies into tools for malicious activities.

The Campaign’s Tactics

Cloudflare is well-regarded for its anti-bot protections and DDoS mitigation, but its features can sometimes hinder security efforts. Attackers have leveraged these features, including human verification and IP filtering, to obfuscate their phishing sites from detection. DomainTools identified this campaign, which used the domain securedsnmail[.]com as the victim’s entry point.

After a user lands on the site, a series of gatekeeping measures, starting with Cloudflare’s human verification checks, are employed to block automated systems. The attackers then examine the visitor’s IP address against a blocklist of known security vendors, effectively bypassing scrutiny from organizations like Palo Alto Networks and FireEye.

Advanced Phishing Techniques

The phishing page also employs a user-agent inspection, dynamically serving a fake ‘404 Not Found’ error to known web crawlers, preventing indexing by search engines and security tools. Once these checks are cleared, users are led to a sophisticated credential harvesting script.

This script uses a custom virtual machine function to hide its logic, evading conventional static code analysis. If a security tool is detected during the session, the script redirects to a legitimate site like Google.com, erasing any trace of malicious activity.

Security Implications and Recommendations

The malicious sites, hosted on Cloudflare and registered through Namecheap, share a static Cloudflare Turnstile sitekey. This identifier could potentially help security teams track and neutralize similar threats across platforms like Shodan and Censys.

Indicators of compromise in this campaign include domains such as securedsnmail[.]com and suitetosecured[.]com. The campaign stresses the need for service providers to implement robust Know Your Customer (KYC) measures and refine their defensive features to prevent misuse.

As cybercriminals become adept at manipulating legitimate platforms, it’s crucial for these platforms to adopt proactive security measures alongside traditional defenses.

Stay informed about the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:anti-bot, Cloudflare, credential theft, Cybersecurity, DDoS, DomainTools, Microsoft 365, Phishing, security research, Threat Actors

Post navigation

Previous Post: New Android Malware Threatens Pix Payments and Banking Apps
Next Post: Apple Enhances Security for Older iOS Devices Against Exploits

Related Posts

Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details Cyber Security News
Hackers Leverage Malicious PyPI Package to Attack Users and Steal Cryptocurrency Details Hackers Leverage Malicious PyPI Package to Attack Users and Steal Cryptocurrency Details Cyber Security News
Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Cyber Security News
5 Deception Solutions that are Changing the Cybersecurity Game  5 Deception Solutions that are Changing the Cybersecurity Game  Cyber Security News
OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection Cyber Security News
New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Meta Unveils New Anti-Scam Tools Amid Global Crackdown
  • Critical Vulnerability in Paloalto Cortex XDR Broker
  • Effective Social Vetting for Security Professionals
  • How Attackers Exploit SOC Workloads Beyond Phishing Emails
  • Critical Splunk Vulnerability Enables Command Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Meta Unveils New Anti-Scam Tools Amid Global Crackdown
  • Critical Vulnerability in Paloalto Cortex XDR Broker
  • Effective Social Vetting for Security Professionals
  • How Attackers Exploit SOC Workloads Beyond Phishing Emails
  • Critical Splunk Vulnerability Enables Command Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News