New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

Keypoints

  • The campaign uses Cloudflare subdomains to host and deliver malware discreetly.
  • Initial access is gained through phishing emails with ZIP files containing disguised Windows Shortcut (LNK) files.
  • The infection chain culminates with a Python-based shellcode loader that executes in-memory payloads.
  • Threat actors target regions in the US, UK, Germany, Europe, and Asia, with unknown identities but fluent English communication.
  • Methods have shifted from URL files to LNK shortcuts masquerading as PDFs, enhancing stealth and evasion.

Read More: https://thehackernews.com/2025/06/new-malware-campaign-uses-cloudflare.html