Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Posted on December 4, 2025December 4, 2025 By CWS

A brand new safety report reveals a troubling actuality in regards to the state of on-line phishing operations. Latest analysis has uncovered over 42,000 validated URLs and domains actively serving phishing kits, command-and-control infrastructure, and malicious payload supply techniques.

The size and class of those operations signify a big departure from conventional phishing makes an attempt.

Somewhat than easy misspelled domains and poorly written messages, fashionable phishing campaigns now function with the effectivity and group of official know-how corporations.

The menace panorama has essentially remodeled from ad-hoc particular person assaults into coordinated felony enterprises.

These operations leverage skilled infrastructure administration, sturdy uptime commitments, and engineered evasion strategies that rival enterprise-grade safety techniques.

SicuraNext safety analysts recognized that the infrastructure supporting these campaigns demonstrates outstanding operational maturity, with a 96.16% imply DNS decision price, indicating extremely secure and well-maintained malicious domains.

SicuraNext safety researchers famous that Cloudflare serves as the first infrastructure supplier for phishing operations worldwide.

The evaluation reveals that 17,202 of the 25,305 tracked malicious domains, representing 68% of all phishing infrastructure, function by Cloudflare’s community.

This focus exists as a result of Cloudflare’s free tier gives menace actors zero upfront price, world-class DDoS safety, and proxy providers that successfully masks the precise internet hosting servers.

The hundreds of malicious domains clustered on AS13335, Cloudflare’s main autonomous system quantity, have made the platform the de facto house base for phishing operations globally.

MFA Bypass Infrastructure and Protection Evasion

Essentially the most harmful growth includes Phishing-as-a-Service platforms, comparable to EvilProxy and Tycoon 2FA.

In contrast to conventional phishing kits that merely steal passwords, these providers function as adversary-in-the-middle proxies, positioning themselves between victims and bonafide providers.

When customers authenticate, the equipment intercepts their session whereas forwarding credentials to the true service, then captures the ensuing session cookie.

This strategy utterly bypasses multi-factor authentication protections. These subtle platforms incorporate a number of evasion applied sciences.

Geofencing blocks safety researchers by IP vary, whereas user-agent-based cloaking restricts content material visibility to particular machine sorts, usually displaying malicious pages solely on cell browsers.

Developer instruments detection instantly stops pages from functioning when safety researchers open inspection instruments. Cloudflare CAPTCHA filters mechanically filter out automated safety scanners.

The evaluation recognized 20 distinct phishing clusters sharing equivalent infrastructure fingerprints, rotated IP ranges, equivalent registrars, and matching evasion patterns, demonstrating coordinated, professionally-managed operations relatively than opportunistic assaults.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actively, Cloudflare, Kits, Phishing, Protected, Report, Serving, Warns

Post navigation

Previous Post: Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
Next Post: New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)

Related Posts

Windows 11 24H2 Update KB5064081 Breaks Video Content Playback Cyber Security News
Critical Vulnerability in Azure Bastion Let Attackers Bypass Authentication and Escalate privileges Cyber Security News
Microsoft 365 Exchange Online Outage Blocks Email on Outlook Mobile App Cyber Security News
Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials Cyber Security News
Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification Cyber Security News
ChatGPT Hacked Using Custom GPTs Exploiting SSRF Vulnerability to Expose Secrets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark