Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Cloudflare Tunnels Misused to Spread Malware

December 6, 2024
Reading Time: 2 mins read
in Alerts
Cloudflare Tunnels Misused to Spread Malware

The Gamaredon group, also known as BlueAlpha, has adopted sophisticated evasion tactics to expand its cyber operations. The group, active since 2014 and linked to Russia’s Federal Security Service (FSB), has recently been observed using Cloudflare Tunnels and DNS fast-fluxing in a spear-phishing campaign targeting Ukrainian entities and NATO-aligned countries, including Bulgaria, Latvia, Lithuania, and Poland. Recorded Future’s Insikt Group has documented these attacks, emphasizing their focus on deploying GammaDrop, a Visual Basic Script (VBS)-based malware used to compromise systems and maintain persistence.

The attack chain begins with phishing emails containing HTML attachments that leverage a technique called HTML smuggling. This method embeds malicious JavaScript to drop a compressed archive containing an LNK file. When executed, the LNK file uses mshta.exe to deliver GammaDrop, a malware dropper responsible for installing a custom loader called GammaLoad. GammaLoad establishes contact with command-and-control (C2) infrastructure hidden behind Cloudflare Tunnels. These tunnels obscure the origin of the staging servers, complicating detection and blocking by traditional security measures.

Gamaredon’s toolset is extensive and aimed at exfiltrating sensitive data and propagating malware. Notable tools include PteroSteal and PteroCookie, which extract credentials and cookies from web browsers, and PteroBleed, which targets data from web versions of Telegram and WhatsApp. Additional utilities, such as PteroLNK, weaponize USB drives to propagate infections, while others provide persistence and proxy functionalities. The group also employs DNS-over-HTTPS (DoH) to resolve C2 domains and uses DNS fast-fluxing to ensure uninterrupted access even when primary servers are blocked. These techniques demonstrate a blend of simplicity and sophistication, compensating for the otherwise rudimentary nature of the group’s malware.

Cybersecurity experts highlight the challenges posed by Gamaredon’s tactics, particularly their use of legitimate services like Cloudflare to evade detection. Their frequent updates and obfuscation efforts make tracking and disrupting their operations increasingly difficult. Organizations are urged to enhance their security measures, including robust phishing protection and advanced behavioral analysis, to counter these evolving threats. For entities with limited cybersecurity resources, Gamaredon’s persistence and reliance on widely trusted services represent a significant risk that underscores the need for global vigilance against state-sponsored cyber threats.

Reference:

  • Gamaredon Exploits Cloudflare Tunnels and DNS Fast-Fluxing to Distribute Malware
Tags: BlueAlphaBulgariaCloudflareCyber AlertsCyber Alerts 2024Cyber threatsDecember 2024GamaredonGammaDropJavascriptLatviaLithuaniaNATOPolandRussia
ADVERTISEMENT

Related Posts

Steganography Cloud C2 In Modular Chain

Steganography Cloud C2 In Modular Chain

September 19, 2025
Steganography Cloud C2 In Modular Chain

Fake Empire Targets Crypto With AMOS

September 19, 2025
Steganography Cloud C2 In Modular Chain

SEO Poisoning Hits Chinese Users

September 19, 2025
Apple Backports Fix For Exploited Bug

Apple Backports Fix For Exploited Bug

September 18, 2025
Apple Backports Fix For Exploited Bug

FileFix Uses Steganography To Drop StealC

September 18, 2025
Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

September 18, 2025

Latest Alerts

Steganography Cloud C2 In Modular Chain

Fake Empire Targets Crypto With AMOS

SEO Poisoning Hits Chinese Users

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

Subscribe to our newsletter

    Latest Incidents

    Russian Hackers Hit Polish Hospitals

    New York Blood Center Data Breach

    Tiffany Data Breach Hits Thousands

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial