{"id":7953,"date":"2024-06-12T06:24:45","date_gmt":"2024-06-12T06:24:45","guid":{"rendered":"\/cybersecurity-blog\/?p=7953"},"modified":"2024-08-06T08:20:49","modified_gmt":"2024-08-06T08:20:49","slug":"cloudflare-phishing-campaign","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/","title":{"rendered":"Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign\u00a0"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Researchers <a href=\"https:\/\/thehackernews.com\/2024\/05\/new-tricks-in-phishing-playbook.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">warn<\/a> about a new wave of phishing attacks.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The attacks exploit Cloudflare Workers and HTML smuggling to steal user credentials from Microsoft, Gmail, Yahoo!, and cPanel Webmail.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What&#8217;s happening?&nbsp;<\/h2>\n\n\n\n<p>Threat actors are using Cloudflare Workers to act as reverse proxy servers for legitimate login pages, intercepting traffic between victims and the login pages. The aim is to capture credentials, cookies, and tokens.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Users in Asia, North America, and Southern Europe are targeted.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Breaking down the attack chain&nbsp;<\/h2>\n\n\n\n<p>The phishing campaigns use a unique approach where the malicious payload is a phishing page itself, reconstructed and presented to the user in their web browser.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>This phishing page prompts the victim to sign in with their Microsoft Outlook or Microsoft 365 account, claiming that they need to do so to view a supposed PDF document.&nbsp;<\/p>\n\n\n\n<p>If the victim falls for the trick and enters their credentials, they are redirected to fake sign-in pages hosted on Cloudflare Workers. These pages are designed to harvest not only the victim&#8217;s login information but also their MFA codes.&nbsp;<\/p>\n\n\n\n<p>The entire phishing page is built using a modified version of an open-source Cloudflare Adversary in the Middle (AitM) toolkit.&nbsp;<\/p>\n\n\n\n<p>When the victim visits the spoofed login page, the attacker collects the web request metadata. They then redirect the victim, who logs in to the legitimate site, and the attacker collects tokens and cookies from the response.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>This allows the attacker to track what the victim does after they log in.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is HTML smuggling?&nbsp;<\/h2>\n\n\n\n<p>HTML smuggling, used in this campaign, is a payload delivery mechanism that has gained traction in recent years. Hackers use this technique to &#8220;smuggle&#8221; malicious code behind firewalls without triggering security alerts.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Here&#8217;s how it works:&nbsp;<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>The attacker first encodes malicious script within an HTML document.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>When a user opens the page in their web browser, the browser decodes the malicious script.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>The script then assembles the payload on the user&#8217;s device.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>In practice, this means that the malicious executable doesn&#8217;t have to pass through a firewall \u2014 instead, the attacker builds the malware locally on the target system.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In this campaign, the attackers use HTML smuggling in a creative way \u2014 to build the actual phishing page on the user&#8217;s device.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">New phishing tactics?&nbsp;<\/h2>\n\n\n\n<p>The phishing campaigns, in general, are becoming more sophisticated, researchers warn. Many employ an array of well-known and new phishing tools:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing-as-a-Service toolkits like <a href=\"https:\/\/app.any.run\/tasks\/ba8155f5-b64c-4769-bca5-1075ea2c0e05?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cloudflare&amp;utm_term=120624&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">Greatness<\/a> to steal Microsoft 365 login credentials and circumvent MFA.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>DNS tunneling to detect when victims interact with phishing content.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>GenAI to write convincing phishing emails.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>QR codes inside PDF files to redirect victims to fake login pages.&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"586\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-1-1024x586.png\" alt=\"\" class=\"wp-image-7962\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-1-1024x586.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-1-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-1-768x440.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-1-1536x879.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-1-2048x1172.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-1-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-1-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-min-1-740x424.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Analyze phishing kits like Greatness in <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cloudflare&amp;utm_term=120624&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a><\/figcaption><\/figure><\/div>\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nEasily analyze malwar<br> in <span class=\"highlight\">ANY.RUN sandbox<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=cloudflare&#038;utm_term=120624&#038;utm_content=linktoregistration#register\/\" rel=\"noopener\" target=\"_blank\">\nRegister free\u00a0\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Analyzing phishing campaigns in ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>Phishing campaigns have become increasingly sophisticated, and hackers are now integrating legitimate tools into their attacks.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">CAPTCHAs&nbsp;<\/h3>\n\n\n\n<p>One tactic we&#8217;ve seen is to place a real CAPTHCA, such as one from CloudFlare or another provider, in front of malicious content.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>This creates a scenario where attackers pit one security system against another \u2014 the CAPTCHA prevents automated security products like web crawlers from reaching the malicious content, and detection doesn&#8217;t work.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Realistic sign-in forms&nbsp;<\/h3>\n\n\n\n<p>In another technique, hackers create copies of web pages that mimic popular services, commonly login portals.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"588\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image5-min-1024x588.png\" alt=\"\" class=\"wp-image-7963\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image5-min-1024x588.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image5-min-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image5-min-768x441.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image5-min-1536x881.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image5-min-2048x1175.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image5-min-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image5-min-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image5-min-740x425.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">The sign in page looks legit \u2014 but look at the URL.&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>&nbsp;In the <a href=\"https:\/\/app.any.run\/tasks\/ab01e92e-d82d-475a-ab1b-1b7a6afe350b?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cloudflare&amp;utm_term=120624&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">example above<\/a>, they mimic a Microsoft login page. In reality, the form sends the login credentials to the server that is under the control of the attacker.&nbsp;<\/p>\n\n\n\n<p>Attackers often place these fake pages behind CAPTHCHAs, and to capture their malicious behavior, you need to go through the entire login flow, from accessing the resource to filling out the CAPTHCHA and submitting the form data.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry all features of <span class=\"highlight\">ANY.RUN sandbox<\/span><br>\nGet 14 days of free trial&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=cloufflare&#038;utm_term=120624&#038;utm_content=linktodemo\/\" rel=\"noopener\" target=\"_blank\">\nStart trial\u00a0\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>ANY.RUN Sandbox can help streamline the analysis of these phishing campaigns. Our users can navigate through captchas in two ways:&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>Manually<\/strong> by clicking on them within the task.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Automatically<\/strong>, by using the <a href=\"https:\/\/any.run\/cybersecurity-blog\/automated-interactivity\/\" target=\"_blank\" rel=\"noreferrer noopener\">automated interactivity (ML) feature<\/a>.&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<p><strong>Automated Interactivity (ML) intelligently mimics human actions during the analysis session<\/strong>, using machine learning to recognize and prioritize buttons based on their importance.&nbsp;<\/p>\n\n\n\n<p>Simply put, it smartly clicks through CAPTHCHAS and login forms for you, so you can sit back and watch the analysis complete itself.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">QR-codes&nbsp;<\/h3>\n\n\n\n<p>Embedding QR codes in emails or documents that link to malicious resources is another growing trend that replaces sending links directly.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Many email providers have implemented security measures to block malicious links and spam phishing emails containing them, but few can extract links from QR codes. By default, inboxes don\u2019t view QR-codes as malicious and allow them through to the inbox.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In ANY.RUN, you can submit a URL extracted from QR codes for a new analysis.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-3-1024x585.png\" alt=\"\" class=\"wp-image-7954\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-3-1024x585.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-3-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-3-768x439.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-3-1536x877.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-3-370x211.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-3-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-3-740x423.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-3.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In the <a href=\"https:\/\/app.any.run\/tasks\/ac0b6323-5476-4fed-9c8a-3b574742349c?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cloudflare&amp;utm_term=120624&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">example above<\/a> we have a phishing email.&nbsp;<\/p>\n\n\n\n<p>By clicking on the filename at the top right of the screen, we can open the <strong>Static discovering <\/strong>view. Click on the <strong>QR <\/strong>and then <strong>Submit to analyze<\/strong>&#8220;to start a new session, this time focusing on the link within the QR.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"588\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-4-1024x588.png\" alt=\"\" class=\"wp-image-7955\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-4-1024x588.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-4-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-4-768x441.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-4-1536x881.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-4-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-4-270x155.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-4-740x425.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/06\/image-4.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We can see that the QR took us to a <a href=\"https:\/\/app.any.run\/tasks\/ffe2f2af-469f-484c-9dbf-01a4c07e26e3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cloudflare&amp;utm_term=120624&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">fake login page<\/a>, and that the phishing was detected by Suricata \u2014 note the message at the bottom left of the screen.&nbsp;<br>&nbsp;<\/p>\n\n\n\n<p>(Phishing is a big topic, and if you want to learn more about these tactics and see more examples, check out our <a href=\"https:\/\/any.run\/cybersecurity-blog\/new-phishing-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\">dedicated article on new phishing tools)<\/a>.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a href=\"?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=mutexes_in_malware&amp;utm_term=130624&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps more than 400,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yara Search<\/a>, and <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find IOCs or files to learn more about the threats and respond to incidents faster.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advantages of ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cloudflare&amp;utm_term=120624&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> helps you analyze threats faster while improving detection rates. The platform detects common malware families with YARA and Suricata rules and identifies malware behavior with signatures when detection by family is not possible.&nbsp;<\/p>\n\n\n\n<p><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in under 40s.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interact with samples in real-time.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Save time and money on sandbox setup and maintenance&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Record and study all aspects of malware behavior.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Collaborate with your team&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scale as you need.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Try the full power of ANY.RUN for free&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cloudflare&amp;utm_term=120624&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial \u2192&nbsp;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers warn about a new wave of phishing attacks.&nbsp;&nbsp; The attacks exploit Cloudflare Workers and HTML smuggling to steal user credentials from Microsoft, Gmail, Yahoo!, and cPanel Webmail.&nbsp; What&#8217;s happening?&nbsp; Threat actors are using Cloudflare Workers to act as reverse proxy servers for legitimate login pages, intercepting traffic between victims and the login pages. The [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,34,40],"class_list":["post-7953","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign\u00a0<\/title>\n<meta name=\"description\" content=\"Learn about a new phishing campaign that\u2019s exploiting Cloudflare Workers and HTML smuggling to steal user credentials.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign\u00a0\",\"datePublished\":\"2024-06-12T06:24:45+00:00\",\"dateModified\":\"2024-08-06T08:20:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/\"},\"wordCount\":1161,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/\",\"name\":\"Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-06-12T06:24:45+00:00\",\"dateModified\":\"2024-08-06T08:20:49+00:00\",\"description\":\"Learn about a new phishing campaign that\u2019s exploiting Cloudflare Workers and HTML smuggling to steal user credentials.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign\u00a0","description":"Learn about a new phishing campaign that\u2019s exploiting Cloudflare Workers and HTML smuggling to steal user credentials.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign\u00a0","datePublished":"2024-06-12T06:24:45+00:00","dateModified":"2024-08-06T08:20:49+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/"},"wordCount":1161,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","malware analysis","malware behavior"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/","url":"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/","name":"Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign\u00a0","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-06-12T06:24:45+00:00","dateModified":"2024-08-06T08:20:49+00:00","description":"Learn about a new phishing campaign that\u2019s exploiting Cloudflare Workers and HTML smuggling to steal user credentials.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/cloudflare-phishing-campaign\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Cybercriminals Exploit Cloudflare Workers and HTML Smuggling in New Phishing Campaign\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7953"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=7953"}],"version-history":[{"count":5,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7953\/revisions"}],"predecessor-version":[{"id":8530,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7953\/revisions\/8530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7956"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=7953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=7953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=7953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}