Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cloudflare Tunnels Abused in New Malware Campaign

Posted on June 20, 2025June 20, 2025 By CWS

Securonix has uncovered a malware distribution marketing campaign that abuses Cloudflare Tunnel to host payloads on attacker-controlled subdomains.

Dubbed Serpentine#Cloud, the marketing campaign depends on a fancy an infection chain involving shortcut (LNK) recordsdata and obfuscated scripts to ship a Python-based loader that may execute a Donut-packed PE payload in reminiscence.

Early assaults linked to this marketing campaign relied on URL recordsdata for payload execution, however later transitioned to utilizing BAT recordsdata, usually in ZIP archives, to fetch and execute payloads from Cloudflare tunnels.

In newer assaults, LNK recordsdata disguised as PDF paperwork have been used for payload supply. Victims are served these recordsdata through phishing emails that includes cost and bill themes, with hyperlinks to a ZIP file containing the LNK file.

Cloudflare tunnels present distant entry to assets, like VPNs, and risk actors are more and more abusing them for malware supply, because it permits them to stay nameless whereas bypassing community protections and detection, since visitors comes from a reputable service.

As a part of the Serpentine#Cloud marketing campaign, the LNK file served to potential victims was noticed triggering a fancy an infection chain that relied on robocopy to fetch a Home windows Script File (WSF) from a distant WebDAV share hosted on Cloudflare’s tunnel infrastructure, and continued with script execution through Home windows Script Host (WSH).

The an infection sequence continued with the execution of an obfuscated batch file that fetches Python-based malware, establishes persistence, hides the malware’s directories, after which executes it.

The malware is a shellcode loader that makes use of “Early Hen APC injection to stealthily execute shellcode inside a newly spawned course of”, Securonix explains. The executed shellcode resolves right into a Home windows PE file that seems to be both a typical or open supply RAT, reminiscent of AsyncRAT or RevengeRAT.Commercial. Scroll to proceed studying.

Serpentine#Cloud shouldn’t be the primary malicious operation to abuse Cloudflare tunnels for backdoor an infection. Final yr, Proofpoint flagged an analogous marketing campaign that distributed AsyncRAT, GuLoader, Remcos, VenomRAT, and Xworm.

Associated: ClickFix Assault Exploits Faux Cloudflare Turnstile to Ship Malware

Associated: In Different Information: Cloudflare Abuse, UK and EU Cybersecurity Studies, FBI Gen-AI Alert

Associated: New Ransomware With RAT Capabilities Impersonating Sophos

Associated: Microsoft Warns Accounting, Tax Return Preparation Companies of Remcos RAT Assaults

Security Week News Tags:Abused, Campaign, Cloudflare, Malware, Tunnels

Post navigation

Previous Post: 161,000 People Impacted by Krispy Kreme Data Breach
Next Post: Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack

Related Posts

O2 Service Vulnerability Exposed User Location Security Week News
TeamFiltration Abused in Entra ID Account Takeover Campaign Security Week News
Critical Vulnerability Patched in Citrix NetScaler Security Week News
In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer Security Week News
Chinese Spies Target Networking and Virtualization Flaws to Breach Isolated Environments Security Week News
Critical Authentication Bypass Flaw Patched in Teleport Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
  • Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure a Web Application Firewall (WAF)
  • Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage
  • Claude Vulnerabilities Let Attackers Execute Unauthorized Commands With its Own Help
  • Threat Actors Using AI to Scale Operations, Accelerate Attacks and Attack Autonomous AI Agents
  • New Python-Based PXA Stealer Via Telegram Stolen 200,000 Unique Passwords and Hundreds of Credit Cards

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News