Description

On August 8, 2022, Cloudflare, a CDN and DDoS mitigation company, confirmed that some of its employees' account credentials were stolen in an SMS phishing attack similar to one that caused to Twilio data breach. Cloudflare also said that, even though threat actors managed to compromise Cloudflare employees' accounts, hackers could not able to breach the company's systems as they didn't have access to the victim's FIDO2-compliant security keys. Additionally, the company claimed, they able to prevent the attack since the company utilizes Cloudflare One products and issued physical security keys to employees to access their applications. As per Cloudflare, after victims enter the credentials on the phishing pages, the victim's system is automatically installed with a remote access software AnyDesk which allows hackers to access the infected system remotely. The phishing messages that were sent to 76 employees and their families are reported to be originated from four phone numbers associated with T-Mobile-issued SIM cards and the attached link redirected users to a fake Cloudflare Okta login page hosted on the cloudflare-okta[.]com domain registered with Porkbun domain registrar. This Porkbun was also used to host phishing landing pages in the attacks against Twilio. In response to the phishing attack, Cloudflare has taken several steps such as blocking the phishing domain with Cloudflare Gateway, identifying and resetting compromised credentials of employees, identifying and removing threat-actor infrastructure, updating detections, detecting any subsequent attack attempts, and auditing service access logs.