Hackers Leverage Cloudflare for RAT Deployment

Hackers Leverage Cloudflare for RAT Deployment

Hackers have been using Cloudflare tunnels since February 2024 to host malware and spread remote access trojans like AsyncRAT, according to Sekoia TDR.

Complex malware attacks are using phishing emails disguised as invoices or orders. These emails contain an uncommon file type, application/windows-library+xml, which can bypass some email filters.

When opened, the file connects to a WebDAV resource hosted on Cloudflare, triggering a multi-step infection process.

The user is led to open a shortcut (LNK) file that launches an HTML Application (HTA) instead of a PDF. This HTA file runs a script that installs Python using PowerShell, helping the malware remain hidden and continue its execution.

 Infection chains distributing AsyncRAT

To avoid detection, attackers hide installation folders and use cleanup scripts. They ensure persistence by placing malicious scripts in the Windows Startup folder, allowing the malware to run after every reboot.

Detection and Monitoring Efforts

Sekoia uses a mix of Sigma rules and custom queries in their SOL language to detect different stages of the attack — from suspicious email attachments to PowerShell commands.

Rules like “Suspicious Email Attachment Received” and “Mshta Suspicious Child Process” help identify malicious activity and command-and-control behavior.

The report highlights how hard it is to detect these advanced threats, especially with attackers using trusted infrastructure and clever evasion tactics.

Sekoia TDR continues to track these threats and improve their detection tools. Their research shows the need for real-time threat intelligence and strong monitoring to stay ahead of cybercriminals.

IOCs

TypeIndicator
Command and Controlmalawi-light-pill-bolt[.]trycloudflare[.]com
players-time-corresponding-th[.]trycloudflare[.]com
spaces-corner-notices-battery[.]trycloudflare[.]com
xi-if-grows-valued[.]trycloudflare[.]com
phvnmarch8787[.]duckdns[.]org
Files0d8d46ec44e737e6ef6cd7df8edf95d83807e84be825ef76089307b399a6bcbb (mslibrary attachment)
c935cc41342794c23d640333a1ddd511f9c51e5b790261dc848ec5f7ac28650a (ben.bat)

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!