Cloudflare's 'pages.dev' and 'workers.dev' domains, originally designed for legitimate uses such as hosting websites and serverless computing, are increasingly exploited by cybercriminals for phishing and other malicious activities. Fortra reports a dramatic rise in abuse, with incidents involving Cloudflare Pages increasing by 198%, from 460 in 2023 to 1,370 as of October 2024, and projected to reach 1,600 by year-end. Attackers host intermediary phishing pages on these platforms to redirect victims to malicious sites like fake Office365 login pages, leveraging Cloudflare’s reputation, cost-efficiency, and detection-evading features. They often embed links in phishing emails or PDFs that bypass security checks. Similarly, Cloudflare Workers, intended for deploying lightweight applications on Cloudflare's network, has been misused for activities such as DDoS attacks, phishing, malicious script injection, and account brute-forcing. Fortra has recorded a 104% surge in phishing incidents on Workers, rising from 2,447 in 2023 to 4,999 year-to-date. The threat actors also employ tactics like "bccfoldering" to conceal phishing campaign scales by hiding recipients in emails. In one instance, attackers hosted a fake human verification page on Workers to enhance the credibility of phishing schemes. With an expected total of nearly 6,000 incidents by year-end, abuse of this platform highlights its growing misuse. To mitigate risks, users should confirm the legitimacy of URLs before entering sensitive data and enable two-factor authentication to safeguard accounts even if credentials are compromised. Cloudflare’s robust features like SSL/TLS encryption and global content delivery have unfortunately been co-opted by cybercriminals, underscoring the need for vigilance in monitoring trusted platforms.
A critical security flaw in Oracle WebLogic Server has rapidly become a prime target for attackers worldwide. Identified as CVE-2026-21962, the issue carries the highest possible s...
A new Windows malware called ResokerRAT has been discovered, which allows attackers to secretly control infected systems. This malware uses Telegram instead of traditional servers ...
A vulnerability has been identified in Google Cloud’s Vertex AI platform that could allow unauthorized users to access sensitive data associated with machine learning workloads. ...