Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Cloudflare to Target Microsoft 365 Users

Hackers Exploit Cloudflare to Target Microsoft 365 Users

Posted on March 12, 2026 By CWS

A sophisticated cyberattack campaign has been uncovered, where threat actors are exploiting Cloudflare’s security features to clandestinely harvest Microsoft 365 credentials. This campaign highlights a concerning trend where attackers turn protective technologies into tools for malicious activities.

The Campaign’s Tactics

Cloudflare is well-regarded for its anti-bot protections and DDoS mitigation, but its features can sometimes hinder security efforts. Attackers have leveraged these features, including human verification and IP filtering, to obfuscate their phishing sites from detection. DomainTools identified this campaign, which used the domain securedsnmail[.]com as the victim’s entry point.

After a user lands on the site, a series of gatekeeping measures, starting with Cloudflare’s human verification checks, are employed to block automated systems. The attackers then examine the visitor’s IP address against a blocklist of known security vendors, effectively bypassing scrutiny from organizations like Palo Alto Networks and FireEye.

Advanced Phishing Techniques

The phishing page also employs a user-agent inspection, dynamically serving a fake ‘404 Not Found’ error to known web crawlers, preventing indexing by search engines and security tools. Once these checks are cleared, users are led to a sophisticated credential harvesting script.

This script uses a custom virtual machine function to hide its logic, evading conventional static code analysis. If a security tool is detected during the session, the script redirects to a legitimate site like Google.com, erasing any trace of malicious activity.

Security Implications and Recommendations

The malicious sites, hosted on Cloudflare and registered through Namecheap, share a static Cloudflare Turnstile sitekey. This identifier could potentially help security teams track and neutralize similar threats across platforms like Shodan and Censys.

Indicators of compromise in this campaign include domains such as securedsnmail[.]com and suitetosecured[.]com. The campaign stresses the need for service providers to implement robust Know Your Customer (KYC) measures and refine their defensive features to prevent misuse.

As cybercriminals become adept at manipulating legitimate platforms, it’s crucial for these platforms to adopt proactive security measures alongside traditional defenses.

Stay informed about the latest cybersecurity developments by following us on Google News, LinkedIn, and X. Contact us to share your stories.

Cyber Security News Tags:anti-bot, Cloudflare, credential theft, Cybersecurity, DDoS, DomainTools, Microsoft 365, Phishing, security research, Threat Actors

Post navigation

Previous Post: New Android Malware Threatens Pix Payments and Banking Apps
Next Post: Apple Enhances Security for Older iOS Devices Against Exploits

Related Posts

Critical VMware Tools VGAuth Vulnerabilities Enable Full System Access for Attackers Critical VMware Tools VGAuth Vulnerabilities Enable Full System Access for Attackers Cyber Security News
New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT New Malware Attack Leverages SVGs, Email Attachments to Deliver XWorm and Remcos RAT Cyber Security News
Securing Remote Endpoints in Distributed Enterprise Systems Securing Remote Endpoints in Distributed Enterprise Systems Cyber Security News
Alice Blue Partners With AccuKnox For Regulatory Compliance Alice Blue Partners With AccuKnox For Regulatory Compliance Cyber Security News
Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware Zloader Malware Repurposed to Act as Entry Point Into Corporate Environments to Deploy Ransomware Cyber Security News
Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands Flipper Zero ‘DarkWeb’ Firmware Bypasses Rolling Code Security on Major Vehicle Brands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Severe N8n Vulnerabilities Risked Server Control
  • Critical Cisco IOS XR Vulnerabilities Demand Immediate Attention
  • Cisco Addresses Critical IOS XR Security Flaws
  • Apple Enhances Security for Older iOS Devices Against Exploits
  • Hackers Exploit Cloudflare to Target Microsoft 365 Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Severe N8n Vulnerabilities Risked Server Control
  • Critical Cisco IOS XR Vulnerabilities Demand Immediate Attention
  • Cisco Addresses Critical IOS XR Security Flaws
  • Apple Enhances Security for Older iOS Devices Against Exploits
  • Hackers Exploit Cloudflare to Target Microsoft 365 Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News