Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cloudflare Tunnels Abused in New Malware Campaign

Posted on June 20, 2025June 20, 2025 By CWS

Securonix has uncovered a malware distribution marketing campaign that abuses Cloudflare Tunnel to host payloads on attacker-controlled subdomains.

Dubbed Serpentine#Cloud, the marketing campaign depends on a fancy an infection chain involving shortcut (LNK) recordsdata and obfuscated scripts to ship a Python-based loader that may execute a Donut-packed PE payload in reminiscence.

Early assaults linked to this marketing campaign relied on URL recordsdata for payload execution, however later transitioned to utilizing BAT recordsdata, usually in ZIP archives, to fetch and execute payloads from Cloudflare tunnels.

In newer assaults, LNK recordsdata disguised as PDF paperwork have been used for payload supply. Victims are served these recordsdata through phishing emails that includes cost and bill themes, with hyperlinks to a ZIP file containing the LNK file.

Cloudflare tunnels present distant entry to assets, like VPNs, and risk actors are more and more abusing them for malware supply, because it permits them to stay nameless whereas bypassing community protections and detection, since visitors comes from a reputable service.

As a part of the Serpentine#Cloud marketing campaign, the LNK file served to potential victims was noticed triggering a fancy an infection chain that relied on robocopy to fetch a Home windows Script File (WSF) from a distant WebDAV share hosted on Cloudflare’s tunnel infrastructure, and continued with script execution through Home windows Script Host (WSH).

The an infection sequence continued with the execution of an obfuscated batch file that fetches Python-based malware, establishes persistence, hides the malware’s directories, after which executes it.

The malware is a shellcode loader that makes use of “Early Hen APC injection to stealthily execute shellcode inside a newly spawned course of”, Securonix explains. The executed shellcode resolves right into a Home windows PE file that seems to be both a typical or open supply RAT, reminiscent of AsyncRAT or RevengeRAT.Commercial. Scroll to proceed studying.

Serpentine#Cloud shouldn’t be the primary malicious operation to abuse Cloudflare tunnels for backdoor an infection. Final yr, Proofpoint flagged an analogous marketing campaign that distributed AsyncRAT, GuLoader, Remcos, VenomRAT, and Xworm.

Associated: ClickFix Assault Exploits Faux Cloudflare Turnstile to Ship Malware

Associated: In Different Information: Cloudflare Abuse, UK and EU Cybersecurity Studies, FBI Gen-AI Alert

Associated: New Ransomware With RAT Capabilities Impersonating Sophos

Associated: Microsoft Warns Accounting, Tax Return Preparation Companies of Remcos RAT Assaults

Security Week News Tags:Abused, Campaign, Cloudflare, Malware, Tunnels

Post navigation

Previous Post: 161,000 People Impacted by Krispy Kreme Data Breach
Next Post: Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack

Related Posts

High-Severity Flaws Patched in Chrome, Firefox Security Week News
Highly Popular NPM Packages Poisoned in New Supply Chain Attack Security Week News
How to Close the AI Governance Gap in Software Development Security Week News
US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’ Security Week News
In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks Security Week News
Code Execution Vulnerability Patched in GitHub Enterprise Server Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases
  • CISA Analyzes Malware From Ivanti EPMM Intrusions
  • ChatGPT Tricked Into Solving CAPTCHAs
  • Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation
  • How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases
  • CISA Analyzes Malware From Ivanti EPMM Intrusions
  • ChatGPT Tricked Into Solving CAPTCHAs
  • Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation
  • How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News