August Phish Flood Warning: Credential Attacks Raining Down From Cloudflare
八月记录显示钓鱼攻击激增,涉及微软支持诈骗、Adobe文件共享和无纸化邮寄交付。攻击者利用MFA中继套件和CloudFlare基础设施逃避检测,并针对亚马逊和雅虎等个人账户发起攻击,尤其在工作设备上。 2025-8-30 17:46:4 Author: pixmsecurity.com(查看原文) 阅读量:15 收藏

Later August saw records of phishing activity spanning Microsoft support scams, Adobe file shares and Paperless Post deliveries. Tactics involved MFA relay kits and usage of CloudFlare infrastructure to evade detection. The same period saw continued targeting of personal accounts like Amazon and Yahoo on work devices. Below are some examples and highlights.

tgcj86gcjyp[.]z13[.]web[.]core[.]windows[.]net

hdbn46dhu[.]z13[.]web[.]core[.]windows[.]net

vtgg97gvy[.]z13[.]web[.]core[.]windows[.]net

asdfdgfcb17ygkjhmb[.]z13[.]web[.]core[.]windows[.]net

sfgd9jthg[.]z13[.]web[.]core[.]windows[.]net

hdbn46dhu[.]z13[.]web[.]core[.]windows[.]net

asfzdxgc7jh[.]z13[.]web[.]core[.]windows[.]net

adsdgfc12dgfc[.]z13[.]web[.]core[.]windows[.]net

erf86efgf[.]z13[.]web[.]core[.]windows[.]net

softviewt[.]de/desk/

darkgreen-crocodile-418773[.]hostingersite[.]com

lexinfoinvite[.]online

xed[.]draigoodro[.]com[.]de

peachpuff-turtle-958085[.]hostingersite[.]com

lph5gcy[.]8izfv5f65u[.]workers[.]dev

underclothes[.]primesicilia[.]it[.]com

ekenewrthanmoupasdertghumused[.]net

comforthcruisebookcrise[.]one

Microsoft Spearphish and Support Scams

On August 17th, a Texas staff member clicked on the below Microsoft spearphish.

This offers the victim multiple options for logging in with different accounts, eg. Outlook, AOL, Office 365, Yahoo etc. and additionally phishes the target’s OTP code to bypass multi factor authentication. It also includes a fake CloudeFlare challenge in order to evade traditional scanners.

On August 18th, three administrators at the same organization clicked on a cluster of Microsoft support scams similar to others observed earlier in August.

Like earlier instances, these pages are customized based on the target’s IP address and use URL parameters to swap the phone number to route different recipients to different call centers. The pages lock the device keyboard, making many users feel that calling the support number is the only way to escape. Others identical attacks targeting the organization include:- 

hdbn46dhu[.]z13[.]web[.]core[.]windows[.]net

vtgg97gvy[.]z13[.]web[.]core[.]windows[.]net

On August 19th, a similar attack was clicked by an administrator at a Kentucky organization, where we note the phone number adjusting based on a different Geography.

Other clusters were clicked around the country, like the below examples targeting administrators in Colorado and Georgia on August 18th.

On August 17th, the below Adobe Cloud phishing attack was clicked by a California staff member.

In addition to leveraging an Adobe file share to evade mailbox inspection, the page itself contained almost 1M characters to evade various sandbox inspection tools.

On August 18th, a Kentucky staff member clicked the below Microsoft spearphishing attack.

This page uses a packed JS loader and an anti-analysis clipboard hook—both common in modern phishing kits—plus a long per-victim id token for tracking.

On August 18th, two administrators at a Kentucky organization clicked Microsoft phishing pages that hosted on primesicilia[.]it[.]com.

The pages prompt for 6-digit MFA codes, enabling real-time relay or OTP capture. The text is obfuscated with invisible spans between letters, defeating naive scanners that look for phrases like “Enter password” or “Sign in.” And most graphics are embedded as data URIs, so the page makes almost no external requests, making it harder to detect.

On August 12th, a staff member at a Massachusetts organization clicked the below phishing site impersonating Microsoft and Google.

It’s hosted on a throwaway Hostinger subdomain (*.hostingersite.com), a cheap, disposable setup attackers churn through to dodge domain blocks and takedowns. It also embeds at least one image as a base64 data URI directly in the HTML, which reduces external requests, keeps everything self-contained, making it harder to detect.

On August 21, another Kentucky staff member clicked the below Microsoft phishing link that also leveraged third party infrastructure, this time from CloudFlare

The site uses Cloudflare Workers, a platform that lets anyone quickly deploy a site under a *.workers.dev subdomain, with HTTPS, CDN edge delivery, and Cloudflare IPs by default. Phishers like it because they don’t need their own hosting or certificates, the site inherits the reputation/performance of a major provider, and they can rotate throwaway subdomains quickly to evade domain-age and blocklist checks.

The same period saw continued targeting of corporate credentials with Paperless Post deliveries, which also leveraged CloudFlare infrastructure, like the two pages below that were clicked by Kentucky staff members.

The attacks likely used the same kit that includes a multi-brand credential harvester that lets victims “sign in” with Outlook/Office 365/Yahoo/AOL (tracking the chosen brand via a hidden ID). It uses a two-stage flow and an OTP prompt to phish MFA codes. The first site also includes a Cloudflare challenge (challenge script//cdn-cgi/…), likely to mask the true hosting and borrow Cloudflare’s reputation and TLS.

E-Commerce Accounts Targeted on Work Devices

The same period saw continued targeting of personal accounts on work devices that again used CloudFlare infrastructure. For example, on August 26th, a staff member at an Illinois organization clicked the below Yahoo phishing attack on their work device.

The page’s HTML explicitly indicates a redirect from a *.workers.dev URL and, thus, that the target clicked a CloudFlare workers URL. As other attacks, this leverages the reputation and performance of CloudFlare’s CDNs.

On August 27th, a staff member at a Georgia organization clicked the below Amazon phishing attack on their work device.

The link includes a special encrypted code so the attackers can track each victim individually while making the scam harder for security tools to spot. It also uses hidden scripts to record activity, and the domain appears to impersonate hostinger, a popular hosting service.

Mitigations

  • Block the specified domains on corporate firewalls and endpoint security solutions.
  • Educate users about phishing risks even on pages that purport to use MFA
  • Remind users of phishing risks for their personal accounts they access even if they are on corporate devices
  • Enforce multi-factor authentication (MFA) on all corporate logins to reduce the risk of credential compromise.

If you are interested in seeing how PIXM can help prevent attacks like these for your organization, book a demo here.

[email protected]


文章来源: https://pixmsecurity.com/blog/blog/summer-phishing-floodwarning-credential-attacks-raining-down-from-cloudflare/
如有侵权请联系:admin#unsafe.sh