
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sun, 05 Apr 2026 02:00:44 GMT</lastBuildDate>
        <item>
            <title><![CDATA[How Cloudflare is using automation to tackle phishing head on]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-is-using-automation-to-tackle-phishing/</link>
            <pubDate>Mon, 17 Mar 2025 05:00:00 GMT</pubDate>
            <description><![CDATA[ How Cloudflare is using threat intelligence and our Developer Platform products to automate phishing abuse reports. ]]></description>
            <content:encoded><![CDATA[ <p>Phishing attacks have grown both in volume and in sophistication over recent years. Today’s threat isn’t just about sending out generic <a href="https://www.cloudflare.com/learning/email-security/what-is-email/"><u>emails</u></a> — bad actors are using advanced phishing techniques like <a href="https://bolster.ai/blog/man-in-the-middle-phishing"><u>2 factor monster in the middle</u></a> (MitM) attacks, <a href="https://blog.cloudflare.com/how-cloudflare-cloud-email-security-protects-against-the-evolving-threat-of-qr-phishing/"><u>QR codes</u></a> to bypass detection rules, and <a href="https://www.malwarebytes.com/blog/news/2025/01/ai-supported-spear-phishing-fools-more-than-50-of-targets"><u>using artificial intelligence (AI)</u></a> to craft personalized and targeted phishing messages at scale. Industry organizations such as the Anti-Phishing Working Group (APWG) <a href="https://docs.apwg.org/reports/apwg_trends_report_q2_2024.pdf"><u>have shown</u></a> that phishing incidents continue to climb year over year.</p><p>To combat both the increase in phishing attacks and the growing complexity, we have built advanced automation tooling to both detect and take action. </p><p>In the first half of 2024, Cloudflare resolved 37% of phishing reports using automated means, and the median time to take action on hosted phishing reports was 3.4 days. In the second half of 2024, after deployment of our new tooling, we were able to expand our automated systems to resolve 78% of phishing reports with a median time to take action on hosted phishing reports of under an hour.</p><p>In this post we dig into some of the details of how we implemented these improvements.</p>
    <div>
      <h3>The phishing site problem</h3>
      <a href="#the-phishing-site-problem">
        
      </a>
    </div>
    <p><a href="https://blog.cloudflare.com/dispelling-the-generative-ai-fear-how-cloudflare-secures-inboxes-against-ai-enhanced-phishing/"><u>Cloudflare has observed a similar increase</u></a> in the volume of phishing activity throughout 2023 and 2024. We receive <a href="https://abuse.cloudflare.com/"><u>abuse reports</u></a> from anyone on the Internet that may have seen potentially abusive behaviors from websites using Cloudflare services. Our Trust &amp; Safety investigators and engineers have been tasked with responding to these complaints, and more recently have been using the data from these reports to improve our threat intelligence, brand protection, and email security product offerings.</p><p>Cloudflare has always believed in using the vast amounts of traffic that flows through our network to improve threat detection and customer security. This has been at the core of how we protect our customers from <a href="https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/"><u>DoS attacks</u></a> and other <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/"><u>cybersecurity</u></a> threats. We've been applying the same concepts our internal teams use to mitigate <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/"><u>phishing</u></a> to improve detection of phishing on our network and our ability to detect and notify our customers about potential risks to their brand.</p><p>Prior to last year, phishing abuse reported to Cloudflare relied on manual, human review and intervention to remediate. Trust &amp; Safety (T&amp;S) investigators would have to look at each complaint, the allegations made by the reporter, and the content on the reported websites to make assessments as quickly as possible about whether the website was phishing or <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/"><u>malware</u></a>.</p><p>Given the growing scale of our customer base and phishing across the Internet, this became unsustainable. By collecting a group of internal experts on abuse, we were able to tackle this problem by using insights across our network, internal data from our <a href="https://developers.cloudflare.com/cloudflare-one/email-security/"><u>Email Security</u></a> product, external feeds from trusted sources, and years of abuse report processing data to automatically assess risk of likely phishing and recommend appropriate action.</p>
    <div>
      <h3>Turning our intelligence inward</h3>
      <a href="#turning-our-intelligence-inward">
        
      </a>
    </div>
    <p>We built our automated phishing identification on the <a href="https://www.cloudflare.com/developer-platform/products/"><u>Cloudflare Developer Platform</u></a> so that we could meet our scanning demand without concern for how we might scale. This allowed us to focus more on creating a great phishing detection engine and less on the infrastructure required to meet that demand. </p><p>Each URL submitted to our phishing detection <a href="https://workers.cloudflare.com/"><u>Worker</u></a> begins with an initial scan by the <a href="https://radar.cloudflare.com/scan"><u>Cloudflare URL Scanner</u></a>. The scan provides us with the rendered HTML, network requests, and attributes of the site. After scanning, we collect reputational information about the site by submitting the HTML and page resources to our in-house <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/"><u>machine learning</u></a> classifiers; meanwhile, the <a href="https://www.cloudflare.com/learning/security/what-are-indicators-of-compromise/"><u>indicators of compromise (IOCs)</u></a> are sent to our suite of <a href="https://www.cloudflare.com/learning/security/glossary/threat-intelligence-feed/"><u>threat feeds</u></a> and domain categorization tools to highlight any known malicious sites or site categorizations.</p><p>Once we have all of this information collected, we expose it to a set of rules and heuristics that identify the URL as phishing or not based on how T&amp;S investigators have traditionally responded to similar abuse reports and patterns of bad behaviors we’ve observed. Rules will suggest decisions to make against the reports, and remediations to make against harmful content. It is through this process that we were able to convert the manual reviews by T&amp;S investigators into an automated flow of phishing identification. We also recognize that reporters make mistakes or even deliberately try to weaponize abuse processes. Our rules must therefore consider the possibility of false positives, in which reports are created against legitimate websites (intentionally or unintentionally). False positives can erode the trust of our customers and create incidents, so automation must include processes to disregard erroneous reports.</p><p>The magic of all of this was the powerful suite of tools on the Cloudflare Developer Platform. Whether it was using <a href="https://developers.cloudflare.com/kv/"><u>KV</u></a> to store report summaries that could scale indefinitely or <a href="https://developers.cloudflare.com/durable-objects/"><u>Durable Objects</u></a> to keep running counters of an unlimited number of attributes that could be tracked or leveraged over time, we were able to integrate the solutions quickly allowing us easily add or remove new enrichments with little effort. We also made use of <a href="https://developers.cloudflare.com/hyperdrive/"><u>Hyperdrive</u></a> to access the internal Postgres database that stores our abuse reports, <a href="https://developers.cloudflare.com/queues/"><u>Queues</u></a> to manage the scanning jobs, <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a> to run machine learning classifiers, and <a href="https://developers.cloudflare.com/d1/"><u>D1</u></a> to store detection logs for efficacy and evaluation review. To tie it all together, the team also deployed a <a href="https://developers.cloudflare.com/pages/framework-guides/deploy-a-remix-site/"><u>Remix Pages UI</u></a> to present all the phishing detection engine’s analysis to T&amp;S investigators for follow-on investigations and evaluations of inconclusive results.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7MQYa4u71uKm9J6AaNxQNy/0cce686f51988ece4a1a46d87dae6df9/image1.png" />
          </figure><p><sup><i>Architecture of Trust &amp; Safety’s phishing automation detection pipeline</i></sup></p>
    <div>
      <h3>Moving forward</h3>
      <a href="#moving-forward">
        
      </a>
    </div>
    <p>The same intelligence we’re gathering to expedite and refine abuse report processing isn’t just for abuse response; it’s also used to empower our customers. By analyzing patterns and trends of abusive behaviors — such as identifying common phrases used in phishing attempts, recognizing infrastructure used by malicious actors or spotting coordinated campaigns across multiple domains — we enhance the efficacy of our application security, email security, and threat intelligence products.</p><p>For our <a href="https://developers.cloudflare.com/learning-paths/application-security/security-center/brand-protection/"><u>Brand Protection</u></a> customers, this translates into a significant advantage: the ability to easily report suspected abuse directly from the Cloudflare dashboard. This feature ensures that potential phishing sites are addressed rapidly, minimizing the risk to your customers and brand reputation. Furthermore, the Trust and Safety team can use this information to take action on similar threats across the Cloudflare network, protecting all customers, even those who aren't Brand Protection users.</p><p>Alongside our network-wide efforts, we’ve also been partnering with our customers, as well as experts outside of Cloudflare, to understand trends they are seeing in their own phishing mitigation efforts. By soliciting intelligence regarding the abuse issues that affect the attack’s targets, we can better identify and prevent abuse of Cloudflare products. We’ve been able to use these partnerships and discussions with external organizations to craft highly targeted rules that head off emerging patterns of phishing activity. </p>
    <div>
      <h3>It takes a village: if you see something, say something</h3>
      <a href="#it-takes-a-village-if-you-see-something-say-something">
        
      </a>
    </div>
    <p>If you believe you’ve identified phishing activity that is passing through Cloudflare’s network, please report it via our <a href="https://abuse.cloudflare.com/"><u>abuse reporting form</u></a>. For technical users who might be interested in a programmatic way to report to us, please review our <a href="https://developers.cloudflare.com/api/resources/abuse_reports/"><u>abuse reporting API</u></a> documentation.</p><p>We invite all of our customers to join us in helping make the Internet safer:</p><ol><li><p>Enterprise customers should speak with their Customer Success Manager about enabling <a href="https://blog.cloudflare.com/safeguarding-your-brand-identity-logo-matching-for-brand-protection/"><u>Brand Protection</u></a>, included by default for all enterprise customers. </p></li><li><p>For existing users of the Brand Protection product, update your <a href="https://developers.cloudflare.com/security-center/brand-protection/"><u>brand's assets</u></a>, so we can better identify the legitimate websites and logos of our customers vs. possible phishing activity.</p></li><li><p>As a Cloudflare customer, make sure your <a href="https://developers.cloudflare.com/fundamentals/setup/account/account-security/abuse-contact/"><u>abuse contact</u></a> is up-to-date in the Cloudflare dashboard.</p></li></ol><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Abuse]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">3Bb3gcZ92DhVXA44P3XF7x</guid>
            <dc:creator>Javier Castro</dc:creator>
            <dc:creator>Justin Paine</dc:creator>
            <dc:creator>Rachael Truong</dc:creator>
        </item>
        <item>
            <title><![CDATA[A wild week in phishing, and what it means for you]]></title>
            <link>https://blog.cloudflare.com/a-wild-week-in-phishing-and-what-it-means-for-you/</link>
            <pubDate>Fri, 16 Aug 2024 18:34:00 GMT</pubDate>
            <description><![CDATA[ From the U.S. elections and geopolitical conflict to tens of millions in corporate dollars lost, phishing remains the root cause of cyber damages. Learn why a comprehensive solution is the best way to stay protected. ]]></description>
            <content:encoded><![CDATA[ 
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qPKUuIGbxmn5I3oGZ7W1E/9bd8faa76cc25b6d2ef1cb81ad920ddd/2504-1-Hero.png" />
          </figure><p>Being a bad guy on the Internet is a really good business. In more than 90% of cybersecurity incidents, phishing is the root cause of the attack, and during this third week of August phishing attacks were reported <a href="https://apnews.com/article/trump-campaign-hacking-iran-769d8411d9a13ef9a0e039c0b6c3b032"><u>against the U.S. elections</u></a>, in the <a href="https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/"><u>geopolitical conflict</u></a> between the U.S., Israel, and Iran, and to cause <a href="https://www.sec.gov/Archives/edgar/data/1609804/000095014224002170/eh240519238_8k.htm"><u>$60M in corporate losses</u></a>.</p><p>You might think that after 30 years of email being the top vector for attack and risk we are helpless to do anything about it, but that would be giving too much credit to bad actors, and a misunderstanding of how defenders focused on detections can take control and win. </p><p>Phishing isn’t about email exclusively, or any specific protocol for that matter. Simply put, it is an attempt to get a person, like you or me, to take an action that unwittingly leads to damages. These attacks work because they appear to be authentic, <a href="https://blog.cloudflare.com/50-most-impersonated-brands-protect-phishing"><u>visually</u></a> or organizationally, such as pretending to be the CEO or CFO of your company, and when you break it down they are <a href="https://blog.cloudflare.com/2023-phishing-report"><u>three main attack vectors that Cloudflare has seen most impactfu</u></a>l from the bad emails we protect our customers from: 1. Clicking links (deceptive links are 35.6% of threat indicators) 2. Downloading files or malware  (malicious attachments are 1.9% of threat indicators) 3. Business email compromise (BEC) phishing that elicits money or intellectual property with no links or files (0.5% of threat indicators).</p><p>Today, we at Cloudflare see an increase in what we’ve termed multi-channel phishing. What other channels are there to send links, files and elicit BEC actions? There’s <a href="https://en.wikipedia.org/wiki/SMS"><u>SMS</u></a> (text messaging) and public and private messaging applications, which are increasingly common attack vectors that take advantage of the ability to send links over those channels, and also how people consume information and work. There’s cloud collaboration, where attackers rely on links, files, and BEC phishing on commonly used collaboration tools like Google Workspace, Atlassian, and Microsoft Office 365. And finally, there’s web and social phishing targeting people on LinkedIn and X. Ultimately, any attempt to stop phishing needs to be comprehensive enough to detect and protect against these different vectors.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79OaEpiIHsCnTgkj7k89Yi/6f7f413ec1bca40e6e00b60863ee2e4e/2504-2.png" />
          </figure><p><sub><i>Learn more about these technologies and products </i></sub><a href="https://www.cloudflare.com/zero-trust/products/"><sub><i><u>here</u></i></sub></a><sub></sub></p>
    <div>
      <h3>A real example</h3>
      <a href="#a-real-example">
        
      </a>
    </div>
    <p>It’s one thing to tell you this, but we’d love to give you an example of how a multi-channel phish plays out with a sophisticated attacker.</p><p>Here’s an email message that an executive notices is in their junk folder. That’s because our <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> product noticed there’s something off about it and moved it there, but it relates to a project the executive is working on, so the executive thinks it’s legitimate. There’s a request for a company org chart, and the attacker knows that this is the kind of thing that’s going to be caught if they continue on email, so they include a link to a real Google form:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RyRiXtEtUg4PsZZ7yoEpY/c0a09b8d47d09b3b306b99d4cc5b667b/2504-3.png" />
          </figure><ul><li><p>The executive clicks the link, and because it is a legitimate Google form, it displays the following:</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2szWX4dGovtdUjDzcRMQxt/6e0e5414ed84cac77c17667e668933a1/2504-4.png" />
          </figure><ul><li><p>There’s a request to upload the org chart here, and that’s what they try to do:</p></li></ul><div>
  
</div><ul><li><p>The executive drags it in, but it doesn’t finish uploading because in the document there is an “internal only” watermark that our <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a> and <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>digital loss prevention (DLP)</u></a> engine detected, which in turn prevented the upload.</p></li><li><p>Sophisticated attackers use urgency to drive better outcomes. Here, the attackers know the executive has an upcoming deadline for the consultant to report back to the CEO. Unable to upload the document, they respond back to the attacker. The attacker suggests that they try another method of upload or, in the worst case scenario, send the document on WhatsApp. </p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nbwpRTramjxvyjgNzYQam/3e1d75596edd0c5b4fcf8323feb242e4/2504-5.png" />
          </figure><ul><li><p>The executive attempts to upload the org chart to the website they were provided in the second email, not knowing that this site would have loaded malware, but because it was loaded in Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/browser-isolation/"><u>Browser Isolation</u></a>, it kept the executive’s device safe. Most importantly, when trying to upload sensitive company documents, the action is stopped again:</p></li></ul><div>
  
</div><ul><li><p>Finally they try WhatsApp, and again, we block it:</p></li></ul><div>
  
</div>

    <div>
      <h3>Ease of use</h3>
      <a href="#ease-of-use">
        
      </a>
    </div>
    <p>Setting up a security solution and maintaining it is critical to long term protection. However, having IT administration teams constantly tweak each product, configuration, and monitor each users’ needs is not only costly but risky as well, as it puts a large amount of overhead on these teams. </p><p>Protecting the executive in the example above required just four steps:</p><ol><li><p>Install and login to Cloudflare’s device agent for protection 
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4jy0exbLu47wyT9AvqdTDb/17b48aaf93df0631a48b24aac58cc727/2504-6.png" />
          </figure><p>
With just a few clicks, anyone with the device agent client can be protected against multi-channel phish, making it easy for end users and administrators. For organizations that don’t allow clients to be installed, an <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/agentless/"><u>agentless deployment</u></a> is also available.  </p></li><li><p>Configure policies that apply to all your user traffic routed through our secure web gateway. These policies can block access outright to high risk sites, such as those known to participate in phishing campaigns. For sites that may be suspicious, such as newly registered domains, isolated browser access allows users to access the website, but limits their interaction.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/43DsyYCbb0prLm14DHN8GA/4f67cd52ff31b3eee121898ca7b4e89f/2504-7.png" />
          </figure><p>The executive was also unable to upload the org chart to a free cloud storage service because their organization is using Cloudflare One’s <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a> and <a href="https://developers.cloudflare.com/cloudflare-one/policies/browser-isolation/setup/"><u>Browser Isolation</u></a> solutions that were configured to load any free cloud storage websites in a remote isolated environment, which not only prevented the upload but also removed the ability to copy and paste information as well.

Also, while the executive was able to converse with the bad actor over WhatsApp, their files were blocked because of Cloudflare One’s Gateway solution, configured by the administrator to block all uploads and downloads on WhatsApp. </p></li><li><p>Set up DLP policies based on what shouldn’t be uploaded, typed, or copied and pasted.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qeRPgGDjHHli36PXUrxm1/492df3aa3f132e05ffc365937c9e22a4/2504-8.png" />
          </figure><p>The executive was unable to upload the org chart to the Google form because the organization is using Cloudflare One’s Gateway and DLP solutions. This protection is implemented by configuring <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Gateway</u></a> to block any <a href="https://developers.cloudflare.com/cloudflare-one/policies/data-loss-prevention/dlp-profiles/"><u>DLP</u></a> infraction, even on a valid website like Google.</p></li><li><p>Deploy Email Security and set up auto-move rules based on the types of emails detected.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19E5AjXPzOqi4u2wY6AvWA/da3e58b7dcc3d33684a3900f85aeab50/2504-9.png" />
          </figure></li></ol><p></p><p>In the example above, the executive never received any of the multiple malicious emails that were sent to them because Cloudflare’s Email Security was protecting their inbox. The phishing emails that did arrive were put into their Junk folder because the email was impersonating someone that didn’t match the signature in the email, and the configuration in Email Security automatically moved it there because of a <a href="https://developers.cloudflare.com/email-security/email-configuration/retract-settings/"><u>one-click configuration</u></a> set by the executive’s IT administrator.</p><p>But even with best-in-class detections, it goes without saying that it is important to have the ability to drill down on any metric to learn about individual users that are being impacted by an ongoing attack. Below is a mockup of our upcoming improved email security monitoring dashboard.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3JyRhqVbppIpAQAIGkVGil/67e3d44df3353b26ec1190dde4a915ff/2504-10.png" />
          </figure><p></p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>While phishing, despite being around for three decades, continues to be a clear and present danger, effective detections in a seamless and comprehensive solution are really the only way to stay protected these days. </p><p>If you’re simply thinking about purchasing email security by itself, you can see why that just isn’t enough. Multi-layered protection is absolutely necessary to protect modern workforces, because work and data don’t just sit in email. They’re everywhere and on every device. Your phishing protection needs to be as well.</p><p>While you can do this by stitching together multiple vendors, it just won’t all work together. And besides the cost, a multi-vendor approach also usually increases overhead for investigation, maintenance, and uniformity for IT teams that are already stretched thin.</p><p>Whether or not you are at the start of your journey with Cloudflare, you can see how getting different parts of the Cloudflare One product suite can help holistically with phishing. And if you are already deep in your journey with Cloudflare, and are looking for 99.99% effective email detections trusted by the Fortune 500, global organizations, and even government entities, you can see how our Email Security helps. </p><p>If you’re running Office 365, and you’d like to see what we can catch that your current provider cannot, you can start right now with <a href="https://developers.cloudflare.com/email-security/deployment/api/setup/email-retro-scan/"><u>Retro Scan</u></a>.</p><p>And if you are using our Email Security solution already, you can learn more about our comprehensive protection <a href="https://www.cloudflare.com/zero-trust/products/"><u>here</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[DLP]]></category>
            <category><![CDATA[Secure Web Gateway]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">12yQcvcZoP7GDmh89iFg24</guid>
            <dc:creator>Pete Pang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Disrupting FlyingYeti's campaign targeting Ukraine]]></title>
            <link>https://blog.cloudflare.com/disrupting-flyingyeti-campaign-targeting-ukraine/</link>
            <pubDate>Thu, 30 May 2024 13:00:38 GMT</pubDate>
            <description><![CDATA[ In April and May 2024, Cloudforce One employed proactive defense measures to successfully prevent Russia-aligned threat actor FlyingYeti from launching their latest phishing campaign targeting Ukraine ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and delay threat activity by the Russia-aligned threat actor FlyingYeti during their latest phishing campaign targeting Ukraine. At the onset of Russia’s invasion of Ukraine on February 24, 2022, Ukraine introduced a moratorium on evictions and termination of utility services for unpaid debt. The moratorium ended in January 2024, resulting in significant debt liability and increased financial stress for Ukrainian citizens. The FlyingYeti campaign capitalized on anxiety over the potential loss of access to housing and utilities by enticing targets to open malicious files via debt-themed lures. If opened, the files would result in infection with the PowerShell malware known as <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">COOKBOX</a>, allowing FlyingYeti to support follow-on objectives, such as installation of additional payloads and control over the victim’s system.</p><p>Since April 26, 2024, Cloudforce One has taken measures to prevent FlyingYeti from launching their phishing campaign – a campaign involving the use of Cloudflare Workers and GitHub, as well as exploitation of the WinRAR vulnerability <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831">CVE-2023-38831</a>. Our countermeasures included internal actions, such as detections and code takedowns, as well as external collaboration with third parties to remove the actor’s cloud-hosted malware. Our effectiveness against this actor prolonged their operational timeline from days to weeks. For example, in a single instance, FlyingYeti spent almost eight hours debugging their code as a result of our mitigations. By employing proactive defense measures, we successfully stopped this determined threat actor from achieving their objectives.</p>
    <div>
      <h3>Executive Summary</h3>
      <a href="#executive-summary">
        
      </a>
    </div>
    <ul><li><p>On April 18, 2024, Cloudforce One detected the Russia-aligned threat actor FlyingYeti preparing to launch a phishing espionage campaign targeting individuals in Ukraine.</p></li><li><p>We discovered the actor used similar tactics, techniques, and procedures (TTPs) as those detailed in <a href="https://cert.gov.ua/article/6278620">Ukranian CERT's article on UAC-0149</a>, a threat group that has primarily <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">targeted Ukrainian defense entities with COOKBOX malware since at least the fall of 2023</a>.</p></li><li><p>From mid-April to mid-May, we observed FlyingYeti conduct reconnaissance activity, create lure content for use in their phishing campaign, and develop various iterations of their malware. We assessed that the threat actor intended to launch their campaign in early May, likely following Orthodox Easter.</p></li><li><p>After several weeks of monitoring actor reconnaissance and weaponization activity (<a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Cyber Kill Chain Stages 1 and 2</a>), we successfully disrupted FlyingYeti’s operation moments after the final COOKBOX payload was built.</p></li><li><p>The payload included an exploit for the WinRAR vulnerability CVE-2023-38831, which FlyingYeti will likely continue to use in their phishing campaigns to infect targets with malware.</p></li><li><p>We offer steps users can take to defend themselves against FlyingYeti phishing operations, and also provide recommendations, detections, and indicators of compromise.</p></li></ul>
    <div>
      <h2>Who is FlyingYeti?</h2>
      <a href="#who-is-flyingyeti">
        
      </a>
    </div>
    <p>FlyingYeti is the <a href="https://www.merriam-webster.com/dictionary/cryptonym">cryptonym</a> given by <a href="/introducing-cloudforce-one-threat-operations-and-threat-research">Cloudforce One</a> to the threat group behind this phishing campaign, which overlaps with UAC-0149 activity tracked by <a href="https://cert.gov.ua/">CERT-UA</a> in <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">February</a> and <a href="https://cert.gov.ua/article/6278620">April</a> 2024. The threat actor uses dynamic DNS (<a href="https://www.cloudflare.com/learning/dns/glossary/dynamic-dns/">DDNS</a>) for their infrastructure and leverages cloud-based platforms for hosting malicious content and for malware command and control (C2). Our investigation of FlyingYeti TTPs suggests this is likely a Russia-aligned threat group. The actor appears to primarily focus on targeting Ukrainian military entities. Additionally, we observed Russian-language comments in FlyingYeti’s code, and the actor’s operational hours falling within the UTC+3 time zone.</p>
    <div>
      <h2>Campaign background</h2>
      <a href="#campaign-background">
        
      </a>
    </div>
    <p>In the days leading up to the start of the campaign, Cloudforce One observed FlyingYeti conducting reconnaissance on payment processes for Ukrainian communal housing and utility services:</p><ul><li><p>April 22, 2024 – research into changes made in 2016 that introduced the use of QR codes in payment notices</p></li><li><p>April 22, 2024 – research on current developments concerning housing and utility debt in Ukraine</p></li><li><p>April 25, 2024 – research on the legal basis for restructuring housing debt in Ukraine as well as debt involving utilities, such as gas and electricity</p></li></ul><p>Cloudforce One judges that the observed reconnaissance is likely due to the Ukrainian government’s payment moratorium introduced at the start of the full-fledged invasion in February 2022. Under this moratorium, outstanding debt would not lead to evictions or termination of provision of utility services. However, on January 9, 2024, the <a href="https://en.interfax.com.ua/news/economic/959388.html">government lifted this ban</a>, resulting in increased pressure on Ukrainian citizens with outstanding debt. FlyingYeti sought to capitalize on that pressure, leveraging debt restructuring and payment-related lures in an attempt to increase their chances of successfully targeting Ukrainian individuals.</p>
    <div>
      <h2>Analysis of the Komunalka-themed phishing site</h2>
      <a href="#analysis-of-the-komunalka-themed-phishing-site">
        
      </a>
    </div>
    <p>The disrupted phishing campaign would have directed FlyingYeti targets to an actor-controlled GitHub page at hxxps[:]//komunalka[.]github[.]io, which is a spoofed version of the Kyiv Komunalka communal housing site <a href="https://www.komunalka.ua">https://www.komunalka.ua</a>. Komunalka functions as a payment processor for residents in the Kyiv region and allows for payment of utilities, such as gas, electricity, telephone, and Internet. Additionally, users can pay other fees and fines, and even donate to Ukraine’s defense forces.</p><p>Based on past FlyingYeti operations, targets may be directed to the actor’s Github page via a link in a phishing email or an encrypted Signal message. If a target accesses the spoofed Komunalka platform at hxxps[:]//komunalka[.]github[.]io, the page displays a large green button with a prompt to download the document “Рахунок.docx” (“Invoice.docx”), as shown in Figure 1. This button masquerades as a link to an overdue payment invoice but actually results in the download of the malicious archive “Заборгованість по ЖКП.rar” (“Debt for housing and utility services.rar”).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22Rnm7YOnwnJocG98RMFDa/def10039081f7e9c6df15980a8b855ac/image4-5.png" />
            
            </figure><p>Figure 1: Prompt to download malicious archive “Заборгованість по ЖКП.rar”</p><p>A series of steps must take place for the download to successfully occur:</p><ul><li><p>The target clicks the green button on the actor’s GitHub page hxxps[:]//komunalka.github[.]io</p></li><li><p>The target’s device sends an HTTP POST request to the Cloudflare Worker worker-polished-union-f396[.]vqu89698[.]workers[.]dev with the HTTP request body set to “user=Iahhdr”</p></li><li><p>The Cloudflare Worker processes the request and evaluates the HTTP request body</p></li><li><p>If the request conditions are met, the Worker fetches the RAR file from hxxps[:]//raw[.]githubusercontent[.]com/kudoc8989/project/main/Заборгованість по ЖКП.rar, which is then downloaded on the target’s device</p></li></ul><p>Cloudforce One identified the infrastructure responsible for facilitating the download of the malicious RAR file and remediated the actor-associated Worker, preventing FlyingYeti from delivering its malicious tooling. In an effort to circumvent Cloudforce One's mitigation measures, FlyingYeti later changed their malware delivery method. Instead of the Workers domain fetching the malicious RAR file, it was loaded directly from GitHub.</p>
    <div>
      <h2>Analysis of the malicious RAR file</h2>
      <a href="#analysis-of-the-malicious-rar-file">
        
      </a>
    </div>
    <p>During remediation, Cloudforce One recovered the RAR file “Заборгованість по ЖКП.rar” and performed analysis of the malicious payload. The downloaded RAR archive contains multiple files, including a file with a name that contains the unicode character “U+201F”. This character appears as whitespace on Windows devices and can be used to “hide” file extensions by adding excessive whitespace between the filename and the file extension. As highlighted in blue in Figure 2, this cleverly named file within the RAR archive appears to be a PDF document but is actually a malicious CMD file (“Рахунок на оплату.pdf[unicode character U+201F].cmd”).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/55Vjmg9VLEnAFv3RZQoZ2l/866016a2489f2a6c780c9f3971dd28ca/image2-11.png" />
            
            </figure><p>Figure 2: Files contained in the malicious RAR archive “Заборгованість по ЖКП.rar” (“Housing Debt.rar”)</p><p>FlyingYeti included a benign PDF in the archive with the same name as the CMD file but without the unicode character, “Рахунок на оплату.pdf” (“Invoice for payment.pdf”). Additionally, the directory name for the archive once decompressed also contained the name “Рахунок на оплату.pdf”. This overlap in names of the benign PDF and the directory allows the actor to exploit the WinRAR vulnerability <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831">CVE-2023-38831</a>. More specifically, when an archive includes a benign file with the same name as the directory, the entire contents of the directory are opened by the WinRAR application, resulting in the execution of the malicious CMD. In other words, when the target believes they are opening the benign PDF “Рахунок на оплату.pdf”, the malicious CMD file is executed.</p><p>The CMD file contains the FlyingYeti PowerShell malware known as <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">COOKBOX</a>. The malware is designed to persist on a host, serving as a foothold in the infected device. Once installed, this variant of COOKBOX will make requests to the DDNS domain postdock[.]serveftp[.]com for C2, awaiting PowerShell <a href="https://learn.microsoft.com/en-us/powershell/scripting/powershell-commands?view=powershell-7.4">cmdlets</a> that the malware will subsequently run.</p><p>Alongside COOKBOX, several decoy documents are opened, which contain hidden tracking links using the <a href="https://canarytokens.com/generate">Canary Tokens</a> service. The first document, shown in Figure 3 below, poses as an agreement under which debt for housing and utility services will be restructured.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20vFV9kNTMmwxFXvpQoJTc/12542fb7a7d2108d49607f2a23fc7575/image5-10.png" />
            
            </figure><p>Figure 3: Decoy document Реструктуризація боргу за житлово комунальні послуги.docx</p><p>The second document (Figure 4) is a user agreement outlining the terms and conditions for the usage of the payment platform komunalka[.]ua.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VHSTwqfrXWXvoryg8lOcE/68eb096bc82f18c7edcb4c88c1ed6d2c/image3-6.png" />
            
            </figure><p>Figure 4: Decoy document Угода користувача.docx <i>(User Agreement.docx)</i></p><p>The use of relevant decoy documents as part of the phishing and delivery activity are likely an effort by FlyingYeti operators to increase the appearance of legitimacy of their activities.</p><p>The phishing theme we identified in this campaign is likely one of many themes leveraged by this actor in a larger operation to target Ukrainian entities, in particular their defense forces. In fact, the threat activity we detailed in this blog uses many of the same techniques outlined in a <a href="https://cert.gov.ua/article/6278620">recent FlyingYeti campaign</a> disclosed by CERT-UA in mid-April 2024, where the actor leveraged United Nations-themed lures involving Peace Support Operations to target Ukraine’s military. Due to Cloudforce One’s defensive actions covered in the next section, this latest FlyingYeti campaign was prevented as of the time of publication.</p>
    <div>
      <h2>Mitigating FlyingYeti activity</h2>
      <a href="#mitigating-flyingyeti-activity">
        
      </a>
    </div>
    <p>Cloudforce One mitigated FlyingYeti’s campaign through a series of actions. Each action was taken to increase the actor’s cost of continuing their operations. When assessing which action to take and why, we carefully weighed the pros and cons in order to provide an effective active defense strategy against this actor. Our general goal was to increase the amount of time the threat actor spent trying to develop and weaponize their campaign.</p><p>We were able to successfully extend the timeline of the threat actor’s operations from hours to weeks. At each interdiction point, we assessed the impact of our mitigation to ensure the actor would spend more time attempting to launch their campaign. Our mitigation measures disrupted the actor’s activity, in one instance resulting in eight additional hours spent on debugging code.</p><p>Due to our proactive defense efforts, FlyingYeti operators adapted their tactics multiple times in their attempts to launch the campaign. The actor originally intended to have the Cloudflare Worker fetch the malicious RAR file from GitHub. After Cloudforce One interdiction of the Worker, the actor attempted to create additional Workers via a new account. In response, we disabled all Workers, leading the actor to load the RAR file directly from GitHub. Cloudforce One notified GitHub, resulting in the takedown of the RAR file, the GitHub project, and suspension of the account used to host the RAR file. In return, FlyingYeti began testing the option to host the RAR file on the file sharing sites <a href="https://pixeldrain.com/">pixeldrain</a> and <a href="https://www.filemail.com/">Filemail</a>, where we observed the actor alternating the link on the Komunalka phishing site between the following:</p><ul><li><p>hxxps://pixeldrain[.]com/api/file/ZAJxwFFX?download=one</p></li><li><p>hxxps://1014.filemail[.]com/api/file/get?filekey=e_8S1HEnM5Rzhy_jpN6nL-GF4UAP533VrXzgXjxH1GzbVQZvmpFzrFA&amp;pk_vid=a3d82455433c8ad11715865826cf18f6</p></li></ul><p>We notified GitHub of the actor’s evolving tactics, and in response GitHub removed the Komunalka phishing site. After analyzing the files hosted on pixeldrain and Filemail, we determined the actor uploaded dummy payloads, likely to monitor access to their phishing infrastructure (FileMail logs IP addresses, and both file hosting sites provide view and download counts). At the time of publication, we did not observe FlyingYeti upload the malicious RAR file to either file hosting site, nor did we identify the use of alternative phishing or malware delivery methods.</p><p>A timeline of FlyingYeti’s activity and our corresponding mitigations can be found below.</p>
    <div>
      <h3>Event timeline</h3>
      <a href="#event-timeline">
        
      </a>
    </div>
    
<div><table><colgroup>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Date</span></th>
    <th><span>Event Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>2024-04-18 12:18</span></td>
    <td><span>Threat Actor (TA) creates a Worker to handle requests from a phishing site</span></td>
  </tr>
  <tr>
    <td><span>2024-04-18 14:16</span></td>
    <td><span>TA creates phishing site komunalka[.]github[.]io on GitHub</span></td>
  </tr>
  <tr>
    <td><span>2024-04-25 12:25</span></td>
    <td><span>TA creates a GitHub repo to host a RAR file</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 07:46</span></td>
    <td><span>TA updates the first Worker to handle requests from users visiting komunalka[.]github[.]io</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 08:24</span></td>
    <td><span>TA uploads a benign test RAR to the GitHub repo</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 13:38</span></td>
    <td><span>Cloudforce One identifies a Worker receiving requests from users visiting komunalka[.]github[.]io, observes its use as a phishing page</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 13:46</span></td>
    <td><span>Cloudforce One identifies that the Worker fetches a RAR file from GitHub (the malicious RAR payload is not yet hosted on the site)</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 19:22</span></td>
    <td><span>Cloudforce One creates a detection to identify the Worker that fetches the RAR</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 21:13</span></td>
    <td><span>Cloudforce One deploys real-time monitoring of the RAR file on GitHub</span></td>
  </tr>
  <tr>
    <td><span>2024-05-02 06:35</span></td>
    <td><span>TA deploys a weaponized RAR (CVE-2023-38831) to GitHub with their COOKBOX malware packaged in the archive</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 10:03</span></td>
    <td><span>TA attempts to update the Worker with link to weaponized RAR, the Worker is immediately blocked</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 10:38</span></td>
    <td><span>TA creates a new Worker, the Worker is immediately blocked</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:04</span></td>
    <td><span>TA creates a new account (#2) on Cloudflare</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:06</span></td>
    <td><span>TA creates a new Worker on account #2 (blocked)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:50</span></td>
    <td><span>TA creates a new Worker on account #2 (blocked)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 12:22</span></td>
    <td><span>TA creates a new modified Worker on account #2</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 16:05</span></td>
    <td><span>Cloudforce One disables the running Worker on account #2</span></td>
  </tr>
  <tr>
    <td><span>2024-05-07 22:16</span></td>
    <td><span>TA notices the Worker is blocked, ceases all operations</span></td>
  </tr>
  <tr>
    <td><span>2024-05-07 22:18</span></td>
    <td><span>TA deletes original Worker first created to fetch the RAR file from the GitHub phishing page</span></td>
  </tr>
  <tr>
    <td><span>2024-05-09 19:28</span></td>
    <td><span>Cloudforce One adds phishing page komunalka[.]github[.]io to real-time monitoring</span></td>
  </tr>
  <tr>
    <td><span>2024-05-13 07:36</span></td>
    <td><span>TA updates the github.io phishing site to point directly to the GitHub RAR link</span></td>
  </tr>
  <tr>
    <td><span>2024-05-13 17:47</span></td>
    <td><span>Cloudforce One adds COOKBOX C2 postdock[.]serveftp[.]com to real-time monitoring for DNS resolution</span></td>
  </tr>
  <tr>
    <td><span>2024-05-14 00:04</span></td>
    <td><span>Cloudforce One notifies GitHub to take down the RAR file</span></td>
  </tr>
  <tr>
    <td><span>2024-05-15 09:00</span></td>
    <td><span>GitHub user, project, and link for RAR are no longer accessible</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 08:23</span></td>
    <td><span>TA updates Komunalka phishing site on github.io to link to pixeldrain URL for dummy payload (pixeldrain only tracks view and download counts)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 08:25</span></td>
    <td><span>TA updates Komunalka phishing site to link to FileMail URL for dummy payload (FileMail tracks not only view and download counts, but also IP addresses)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 12:21</span></td>
    <td><span>Cloudforce One downloads PixelDrain document to evaluate payload</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 12:47</span></td>
    <td><span>Cloudforce One downloads FileMail document to evaluate payload</span></td>
  </tr>
  <tr>
    <td><span>2024-05-29 23:59</span></td>
    <td><span>GitHub takes down Komunalka phishing site</span></td>
  </tr>
  <tr>
    <td><span>2024-05-30 13:00</span></td>
    <td><span>Cloudforce One publishes the results of this investigation</span></td>
  </tr>
</tbody></table></div>
    <div>
      <h2>Coordinating our FlyingYeti response</h2>
      <a href="#coordinating-our-flyingyeti-response">
        
      </a>
    </div>
    <p>Cloudforce One leveraged industry relationships to provide advanced warning and to mitigate the actor’s activity. To further protect the intended targets from this phishing threat, Cloudforce One notified and collaborated closely with GitHub’s Threat Intelligence and Trust and Safety Teams. We also notified CERT-UA and Cloudflare industry partners such as CrowdStrike, Mandiant/Google Threat Intelligence, and Microsoft Threat Intelligence.</p>
    <div>
      <h3>Hunting FlyingYeti operations</h3>
      <a href="#hunting-flyingyeti-operations">
        
      </a>
    </div>
    <p>There are several ways to hunt FlyingYeti in your environment. These include using PowerShell to hunt for WinRAR files, deploying Microsoft Sentinel analytics rules, and running Splunk scripts as detailed below. Note that these detections may identify activity related to this threat, but may also trigger unrelated threat activity.</p>
    <div>
      <h3>PowerShell hunting</h3>
      <a href="#powershell-hunting">
        
      </a>
    </div>
    <p>Consider running a PowerShell script such as <a href="https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT/blob/main/hunt-script.ps1">this one</a> in your environment to identify exploitation of CVE-2023-38831. This script will interrogate WinRAR files for evidence of the exploit.</p>
            <pre><code>CVE-2023-38831
Description:winrar exploit detection 
open suspios (.tar / .zip / .rar) and run this script to check it 

function winrar-exploit-detect(){
$targetExtensions = @(".cmd" , ".ps1" , ".bat")
$tempDir = [System.Environment]::GetEnvironmentVariable("TEMP")
$dirsToCheck = Get-ChildItem -Path $tempDir -Directory -Filter "Rar*"
foreach ($dir in $dirsToCheck) {
    $files = Get-ChildItem -Path $dir.FullName -File
    foreach ($file in $files) {
        $fileName = $file.Name
        $fileExtension = [System.IO.Path]::GetExtension($fileName)
        if ($targetExtensions -contains $fileExtension) {
            $fileWithoutExtension = [System.IO.Path]::GetFileNameWithoutExtension($fileName); $filename.TrimEnd() -replace '\.$'
            $cmdFileName = "$fileWithoutExtension"
            $secondFile = Join-Path -Path $dir.FullName -ChildPath $cmdFileName
            
            if (Test-Path $secondFile -PathType Leaf) {
                Write-Host "[!] Suspicious pair detected "
                Write-Host "[*]  Original File:$($secondFile)" -ForegroundColor Green 
                Write-Host "[*] Suspicious File:$($file.FullName)" -ForegroundColor Red

                # Read and display the content of the command file
                $cmdFileContent = Get-Content -Path $($file.FullName)
                Write-Host "[+] Command File Content:$cmdFileContent"
            }
        }
    }
}
}
winrar-exploit-detect</code></pre>
            
    <div>
      <h3></h3>
      <a href="#">
        
      </a>
    </div>
    <p>Microsoft Sentinel</p><p>In Microsoft Sentinel, consider deploying the rule provided below, which identifies WinRAR execution via cmd.exe. Results generated by this rule may be indicative of attack activity on the endpoint and should be analyzed.</p>
            <pre><code>DeviceProcessEvents
| where InitiatingProcessParentFileName has @"winrar.exe"
| where InitiatingProcessFileName has @"cmd.exe"
| project Timestamp, DeviceName, FileName, FolderPath, ProcessCommandLine, AccountName
| sort by Timestamp desc</code></pre>
            
    <div>
      <h3></h3>
      <a href="#">
        
      </a>
    </div>
    <p>Splunk</p><p>Consider using <a href="https://research.splunk.com/endpoint/d2f36034-37fa-4bd4-8801-26807c15540f/">this script</a> in your Splunk environment to look for WinRAR CVE-2023-38831 execution on your Microsoft endpoints. Results generated by this script may be indicative of attack activity on the endpoint and should be analyzed.</p>
            <pre><code>| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.parent_process_name=winrar.exe `windows_shells` OR Processes.process_name IN ("certutil.exe","mshta.exe","bitsadmin.exe") by Processes.dest Processes.user Processes.parent_process_name Processes.parent_process Processes.process_name Processes.process Processes.process_id Processes.parent_process_id 
| `drop_dm_object_name(Processes)` 
| `security_content_ctime(firstTime)` 
| `security_content_ctime(lastTime)` 
| `winrar_spawning_shell_application_filter`</code></pre>
            
    <div>
      <h2>Cloudflare product detections</h2>
      <a href="#cloudflare-product-detections">
        
      </a>
    </div>
    
    <div>
      <h3>Cloudflare Email Security</h3>
      <a href="#cloudflare-email-security">
        
      </a>
    </div>
    <p>Cloudflare Email Security (CES) customers can identify FlyingYeti threat activity with the following detections.</p><ul><li><p>CVE-2023-38831</p></li><li><p>FLYINGYETI.COOKBOX</p></li><li><p>FLYINGYETI.COOKBOX.Launcher</p></li><li><p>FLYINGYETI.Rar</p></li></ul>
    <div>
      <h2>Recommendations</h2>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>Cloudflare recommends taking the following steps to mitigate this type of activity:</p><ul><li><p>Implement Zero Trust architecture foundations:    </p></li><li><p>Deploy Cloud Email Security to ensure that email services are protected against phishing, BEC and other threats</p></li><li><p>Leverage browser isolation to separate messaging applications like LinkedIn, email, and Signal from your main network</p></li><li><p>Scan, monitor and/or enforce controls on specific or sensitive data moving through your network environment with data loss prevention policies</p></li><li><p>Ensure your systems have the latest WinRAR and Microsoft security updates installed</p></li><li><p>Consider preventing WinRAR files from entering your environment, both at your Cloud Email Security solution and your Internet Traffic Gateway</p></li><li><p>Run an Endpoint Detection and Response (EDR) tool such as CrowdStrike or Microsoft Defender for Endpoint to get visibility into binary execution on hosts</p></li><li><p>Search your environment for the FlyingYeti indicators of compromise (IOCs) shown below to identify potential actor activity within your network.</p></li></ul><p>If you’re looking to uncover additional Threat Intelligence insights for your organization or need bespoke Threat Intelligence information for an incident, consider engaging with Cloudforce One by contacting your Customer Success manager or filling out <a href="https://www.cloudflare.com/zero-trust/lp/cloudforce-one-threat-intel-subscription/">this form</a>.</p>
    <div>
      <h2>Indicators of Compromise</h2>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    
<div><table><colgroup>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Domain / URL</span></th>
    <th><span>Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>komunalka[.]github[.]io</span></td>
    <td><span>Phishing page</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//github[.]com/komunalka/komunalka[.]github[.]io</span></td>
    <td><span>Phishing page</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//worker-polished-union-f396[.]vqu89698[.]workers[.]dev</span></td>
    <td><span>Worker that fetches malicious RAR file</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//raw[.]githubusercontent[.]com/kudoc8989/project/main/Заборгованість по ЖКП.rar</span></td>
    <td><span>Delivery of malicious RAR file</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//1014[.]filemail[.]com/api/file/get?filekey=e_8S1HEnM5Rzhy_jpN6nL-GF4UAP533VrXzgXjxH1GzbVQZvmpFzrFA&amp;pk_vid=a3d82455433c8ad11715865826cf18f6</span></td>
    <td><span>Dummy payload</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//pixeldrain[.]com/api/file/ZAJxwFFX?download=</span></td>
    <td><span>Dummy payload</span></td>
  </tr>
  <tr>
    <td><span>hxxp[:]//canarytokens[.]com/stuff/tags/ni1cknk2yq3xfcw2al3efs37m/payments.js</span></td>
    <td><span>Tracking link</span></td>
  </tr>
  <tr>
    <td><span>hxxp[:]//canarytokens[.]com/stuff/terms/images/k22r2dnjrvjsme8680ojf5ccs/index.html</span></td>
    <td><span>Tracking link</span></td>
  </tr>
  <tr>
    <td><span>postdock[.]serveftp[.]com</span></td>
    <td><span>COOKBOX C2</span></td>
  </tr>
</tbody></table></div> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[CVE]]></category>
            <category><![CDATA[Exploit]]></category>
            <category><![CDATA[GitHub]]></category>
            <category><![CDATA[Intrusion Detection]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Microsoft]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Serverless]]></category>
            <category><![CDATA[Threat Data]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Threat Operations]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">5JO10nXN3tLVG2C1EttkiH</guid>
            <dc:creator>Cloudforce One</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare Cloud Email Security protects against the evolving threat of QR phishing]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-cloud-email-security-protects-against-the-evolving-threat-of-qr-phishing/</link>
            <pubDate>Wed, 17 Apr 2024 13:00:44 GMT</pubDate>
            <description><![CDATA[ Learn about how Cloudflare's Cloud Email Security tackles QR phishing, why attackers favor QR codes, and Cloudflare's proactive defense strategy against evolving threats ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vqiqKMC9TcbN2grgE4JNX/bde05e055953c24da09e4bf4f0194324/image12-1.png" />
            
            </figure><p>In the ever-evolving landscape of cyber threats, a subtle yet potent form of phishing has emerged — <a href="https://www.cloudflare.com/learning/security/what-is-quishing/">quishing</a>, short for QR phishing. It has been <a href="https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/brief-history-qr-codes">30 years since the invention of QR codes</a>, yet quishing still poses a significant risk, especially after the era of COVID, when QR codes became the norm to check statuses, register for events, and even order food.</p><p>Since 2020, <a href="https://developers.cloudflare.com/email-security/">Cloudflare’s cloud email security solution (previously known as Area 1)</a> has been at the forefront of fighting against quishing attacks, taking a proactive stance in dissecting them to better protect our customers. Let’s delve into the mechanisms behind QR phishing, explore why QR codes are a preferred tool for attackers, and review how Cloudflare contributes to the fight against this evolving threat.</p>
    <div>
      <h2>How quishing works</h2>
      <a href="#how-quishing-works">
        
      </a>
    </div>
    <p>The impact of phishing and quishing are quite similar, as both can result in users having their credentials compromised, devices compromised, or even financial loss. They also leverage malicious attachments or websites to provide bad actors the ability to access something they normally wouldn’t be able to. Where they differ is that quishing is typically highly targeted and uses a QR code to further obfuscate itself from detection.</p><p>Since phish detection engines require inputs like URLs or attachments inside an email in order to detect, quish succeeds by hampering the detection of these inputs. In Example A below, the phish’s URL was crawled and after two redirects landed on a malicious website that automatically tries to run key logging malware that copies login names and passwords. For Example A, this clearly sets off the detectors, but Example B has no link to crawl and therefore the same detections that worked on Example A are rendered inert.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jABZ5PmTIPdOp78Kaq5ZH/e9c93303b5187c80a31d7a41901e1f85/Screenshot-2024-04-16-at-13.33.49.png" />
            
            </figure><p>Strange you say, if my phone can scan that QR code then can’t a detection engine recognize the QR code as well? Simply put, no, because phish detection engines are optimized for catching phish, but to identify and scan QR codes requires a completely different engine – a computer vision engine. This brings us to why QR codes are a preferred tool for attackers.</p>
    <div>
      <h2>Why QR codes for phishing?</h2>
      <a href="#why-qr-codes-for-phishing">
        
      </a>
    </div>
    <p>There are three main reasons QR codes are popular in <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing attacks</a>. First, QR codes boast strong error correction capabilities, allowing them to withstand resizing, pixel shifting, variations in lighting, partial cropping, and other distortions. Indeed, computer vision models can scan QR codes, but identifying which section of an email, image, or webpage linked in an email has a QR code is quite difficult for a machine, and even more so if the QR codes have been obfuscated to hide themselves from some computer vision models. For example, by inverting them, blending them with other colors or images, or making them extremely small, computer vision models will have trouble even identifying the presence of QR codes, much less even being able to scan them. Though filters and additional processing can be applied to any image, not knowing what or where to apply makes the deobfuscation of a QR code an extremely expensive computational problem. This not only makes catching all quish hard, but is likely to cause frustration for an end user who won’t get their emails quickly because an image or blob of text looks similar to a QR code, resulting in delivery delays.</p><p>Even though computer vision models may have difficulty deobfuscating QR codes, we have discovered from experience that when a human encounters these obfuscated QR codes, with enough time and effort, they are usually able to scan the QR code. By doing everything from increasing the brightness of their screen, to printing out the email, to resizing the codes themselves, they can make a QR code that has been hidden from machines scan successfully.</p><p><i>Don’t believe us? Try it for yourself with the QR codes that have been obfuscated for machines. They all link to</i> <a href="/"><i>https://blog.cloudflare.com/</i></a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1q4lolcNSXKWznwHGZMIFh/5e43d3d517b9c7eedf5afe6a9f5b11c3/Screenshot-2024-04-16-at-13.35.32.png" />
            
            </figure><p><i>(</i><a href="https://www.freepik.com/free-photo/old-textured-brick-wall-background_18998169.htm#query=brick%20wall&amp;position=0&amp;from_view=keyword&amp;track=ais&amp;uuid=5fc175de-b992-4443-aad7-730f83770fbb"><i>Brick wall image by rawpixel.com on Freepik</i></a><i>)</i></p><p>If you scanned any of the example QR codes above, you have just proven the next reason bad actors favor quish. The devices used for accessing QR codes are typically personal devices with a limited security posture, making them susceptible to exploitation. While secured corporate devices typically have measures to warn, stop, or sandbox users when they access malicious links, these protections are not available natively on personal devices. This can be especially worrisome, as we have seen a trend towards custom QR codes targeting executives in organizations.</p><p>QR codes can also be seamlessly layered in with other obfuscation techniques, such as encrypted attachments, mirrors that mimic well-known websites, validations to prove you are human before malicious content is revealed, and more. This versatility makes them an attractive choice for cybercriminals seeking innovative ways to deceive unsuspecting users by adding QR codes to previously successful phishing vectors that have now been blocked by security products.</p>
    <div>
      <h2>Cloudflare's protection strategy</h2>
      <a href="#cloudflares-protection-strategy">
        
      </a>
    </div>
    <p>Cloudflare has been at the forefront of defending against quishing attacks. We employ a multi-faceted approach, and instead of focusing on archaic, layered email configuration rules, we have trained our machine learning (ML) detection models on almost a decade’s worth of detection data and have a swath of proactive computer vision models to ensure all of our customers start with a turnkey solution.</p><p>For quish detections, we break it into two parts: 1) identification and scanning of QR codes 2) analysis of decoded QR codes.</p><p>The first part is solved by our own QR code detection heuristics that inform how, when, and where for our computer vision models to execute. We then leverage the newest libraries and tools to help identify, process, and most importantly decode QR codes. While it is relatively easy for a human to identify a QR code, there is almost no limit to how many ways they can be obfuscated to machines. The examples we provided above are just a small sample of what we’ve seen in the wild, and bad actors are constantly discovering new methods to make QR codes hard to quickly find and identify, making it a constant cat and mouse game that requires us to regularly update our tools for the trending obfuscation technique.</p><p>The second part, analysis of decoded QR codes, goes through all the same treatment we apply to phish and then some. We have engines that deconstruct complex URLs and drill down to the final URL, from redirect to redirect, whether they are automatic or not. Along the way, we scan for malicious attachments and malicious websites and log findings for future detections to cross-reference. If we encounter any files or content that are encrypted or password protected, we leverage another group of engines that attempt to decrypt and unprotect them, so we can identify if there was any obfuscated malicious content. Most importantly, with all of this information, we continuously update our databases with this new data, including the obfuscation of the QR code, to make better assessments of similar attacks that leverage the methods we have documented.</p><p>However, even with a well-trained suite of phish detection tools, quite often the malicious content is at the end of a long chain of redirects that prevent automated web crawlers from identifying anything at all, much less malicious content. In between redirects, there might be a hard block that requires human validation, such as a <a href="https://www.cloudflare.com/learning/bots/how-captchas-work/">CAPTCHA</a>, which makes it virtually impossible for an automated process to crawl past, and therefore unable to classify any content at all. Or there might be a conditional block with campaign identification requirements, so if anyone is outside the original target’s region or has a web browser and operating system version that doesn’t meet the campaign requirements, they would simply view a benign website, while the target would be exposed to the malicious content. Over the years, we have built tools to identify and pass these validations, so we can determine malicious content that may be there.</p><p>However, even with all the technologies we’ve built over the years, there are cases where we aren’t able to easily get to the final content. In those cases, our link reputation machine learning models, which have been trained on multiple years of scanned links and their metadata, have proven to be quite valuable and are easily applied after QR codes are decoded as well. By correlating things like domain metadata, URL structure, URL query strings, and our own historical data sets, we are able to make inferences to protect our customers. We also take a proactive approach and leverage our ML models to tell us where to hunt for QR codes, even if they aren’t immediately obvious, and by scrutinizing domains, sentiment, context, IP addresses, historical use, and social patterns between senders and recipients, Cloudflare identifies and neutralizes potential threats before they can inflict harm.</p>
    <div>
      <h2>Creative examples and real world instances</h2>
      <a href="#creative-examples-and-real-world-instances">
        
      </a>
    </div>
    <p>With the thousands of QR codes we process daily, we see some interesting trends. Notable companies, including Microsoft and DocuSign, have frequently been the subjects of impersonation for quishing attacks. What makes this more confusing for users, and even more likely to scam them, is that these companies actually use QR codes in their legitimate workflows. This further underscores the urgency for organizations to fortify their defenses against this evolving threat.</p><p>Below are three examples of the most interesting quish we have found and compared against the real use cases by the respective companies. The QR codes used in these emails have been masked.</p>
    <div>
      <h3>Microsoft Authenticator</h3>
      <a href="#microsoft-authenticator">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/26vhSfHns8YkKs1DtB1p9n/3b39f16fb2feeab377679ad1466f5084/Screenshot-2024-04-16-at-13.37.12.png" />
            
            </figure><p>Microsoft uses QR codes as a faster way to complete <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">MFA</a> instead of sending six digit SMS codes to users’ phones that can be delayed and are also considered safer, as SMS MFA can be intercepted through SIM swap attacks. Users would have independently registered their devices and would have previously seen the registration screen on the right, so receiving an email that says they need to re-authenticate doesn’t seem especially odd.</p>
    <div>
      <h3>DocuSign</h3>
      <a href="#docusign">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/167XX59i4v1Im47dNhjxUm/adc13cc6a4aba177c1d009e18567ad30/Screenshot-2024-04-16-at-13.38.14.png" />
            
            </figure><p>DocuSign uses QR codes to make it easier for users to download their mobile app tosign documents, <a href="https://support.docusign.com/s/document-item?language=en_US&amp;bundleId=ced1643229641057&amp;topicId=iww1578456547699.html&amp;_LANG=enus">identity verification</a> via a mobile device to take photos, and supports embedding DocuSign features in <a href="https://support.docusign.com/s/document-item?language=en_US&amp;rsc_301=&amp;bundleId=yca1573855023892&amp;topicId=xhc1615577299246.html&amp;_LANG=enus">third party apps</a> which have their own QR code scanning functionality. The use of QR codes in native DocuSign apps and non-native apps makes it confusing for frequent DocuSign users and not at all peculiar for users that rarely use DocuSign. While the QR code for downloading the DocuSign app is not used in signature requests, to a frequent user, it might just seem like a fast method to open the request in the app they already have downloaded on their mobile device.</p>
    <div>
      <h3>Microsoft Teams</h3>
      <a href="#microsoft-teams">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7j7KenKXtrmjJlNnHBPy2O/40cc68d61e198e8181fa4ccf6f12ecb4/Screenshot-2024-04-16-at-13.38.53.png" />
            
            </figure><p>Microsoft uses QR codes for Teams to allow users to quickly join a team via a mobile device, and while Teams doesn’t use QR codes for voicemails, it does have a voicemail feature. The email on the left seems like a reminder to check voicemail in Teams and combines the two real use cases on the right.</p>
    <div>
      <h2>How you can help prevent quishing</h2>
      <a href="#how-you-can-help-prevent-quishing">
        
      </a>
    </div>
    <p>As we confront the persistent threat of quishing, it's crucial for individuals and organizations to be vigilant.  While no solution can guarantee 100% protection, collective diligence can significantly reduce the risk, and we encourage collaboration in the fight against quishing.</p><p>If you are already a Cloud Email Security customer, we remind you to <a href="https://developers.cloudflare.com/email-security/email-configuration/phish-submissions/">submit instances</a> of quish from within our portal to help stop current threats and enhance the capabilities of future machine learning models, leading to more proactive defense strategies. If you aren’t a customer, you can still submit original quish samples as an attachment in <a href="https://docs.fileformat.com/email/eml/">EML</a> format to <a>quish@cloudflare.com</a>, and remember to leverage your email security provider’s submission process to inform them of these quishing vectors as well.</p><p>The battle against quishing is ongoing, requiring continuous innovation and collaboration. To support submissions of quish, we are developing new methods for customers to provide targeted feedback to our models and also adding additional transparency to our metrics to facilitate tracking a variety of vectors, including quish.</p> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">4U4At0ve95ZFEqtwjjVm10</guid>
            <dc:creator>Pete Pang</dc:creator>
        </item>
        <item>
            <title><![CDATA[From .com to .beauty: The evolving threat landscape of unwanted email]]></title>
            <link>https://blog.cloudflare.com/top-level-domains-email-phishing-threats/</link>
            <pubDate>Tue, 26 Mar 2024 13:00:20 GMT</pubDate>
            <description><![CDATA[ In this 2023-early 2024 email analysis, we examine how certain generic Top-Level Domains (TLDs) are primarily used for spam and phishing, and their evolution over a year. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6llbY6RiwuM9hAX813Fkc3/6ec382a3027d32f79b6e0cbda61647d9/A-Highest-email-threat-Top-Level-Domains.png" />
            
            </figure><p>You're browsing your inbox and spot an email that looks like it's from a brand you trust. Yet, something feels off. This might be a phishing attempt, a common tactic where cybercriminals impersonate reputable entities — we've written about the <a href="/50-most-impersonated-brands-protect-phishing">top 50 most impersonated brands</a> used in phishing attacks. One factor that can be used to help evaluate the email's legitimacy is its Top-Level Domain (<a href="https://www.cloudflare.com/learning/dns/top-level-domain/">TLD</a>) — the part of the email address that comes after the dot.</p><p>In this analysis, we focus on the TLDs responsible for a significant share of malicious or spam emails since January 2023. For the purposes of this blog post, we are considering malicious email messages to be equivalent to phishing attempts. With an average of 9% of 2023's emails processed by Cloudflare’s Cloud Email Security service marked as spam and 3% as malicious, rising to 4% by year-end, we aim to identify trends and signal which TLDs have become more dubious over time. Keep in mind that our measurements represent where we observe data across the email delivery flow. In some cases, we may be observing after initial filtering has taken place, at a point where missed classifications are likely to cause more damage. This information derived from this analysis could serve as a guide for Internet users, corporations, and geeks like us, searching for clues, as Internet detectives, in identifying potential threats. To make this data readily accessible, <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, our tool for Internet insights, now <a href="/email-security-insights-on-cloudflare-radar">includes a new section</a> dedicated to email security trends.</p><p>Cyber attacks often leverage the guise of authenticity, a tactic <a href="/2022-07-sms-phishing-attacks">Cloudflare thwarted</a> following a phishing scheme similar to the one that compromised Twilio in 2022. The US Cybersecurity and Infrastructure Security Agency (<a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>) notes that 90% of cyber attacks start with phishing, and fabricating trust is a key component of successful malicious attacks. We see there are two forms of authenticity that attackers can choose to leverage when crafting phishing messages, visual and organizational. Attacks that leverage visual authenticity rely on attackers using branding elements, like logos or images, to build credibility. Organizationally authentic campaigns rely on attackers using previously established relationships and business dynamics to establish trust and be successful.</p><p>Our findings from 2023 reveal that recently introduced generic TLDs (<a href="https://icannwiki.org/Generic_top-level_domain">gTLDs</a>), including several linked to the <a href="https://www.prnewswire.com/news-releases/domain-makeovers-begin-with-beauty-hair-skin-and-makeup-301182816.html">beauty industry</a>, are predominantly used both for spam and malicious attacks. These TLDs, such as .uno, .sbs, and .beauty, all introduced since 2014, have seen over 95% of their emails flagged as spam or malicious. Also, it's important to note that in terms of volume, “.com” accounts for 67% of all spam and malicious emails (more on that below).</p><table><colgroup><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>TLDs</span></p></td><td><p><span>2023 Spam %</span></p></td><td><p><span>2023 Malicious %</span></p></td><td><p><span>2023 Spam + malicious %</span></p></td><td><p><span>TLD creation</span></p></td></tr><tr><td><p><span>.uno</span></p></td><td><p><span>62%</span></p></td><td><p><span>37%</span></p></td><td><p><span>99%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.sbs</span></p></td><td><p><span>64%</span></p></td><td><p><span>35%</span></p></td><td><p><span>98%</span></p></td><td><p><span>2021</span></p></td></tr><tr><td><p><span>.best</span></p></td><td><p><span>68%</span></p></td><td><p><span>29%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.beauty</span></p></td><td><p><span>77%</span></p></td><td><p><span>20%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2021</span></p></td></tr><tr><td><p><span>.top</span></p></td><td><p><span>74%</span></p></td><td><p><span>23%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.hair</span></p></td><td><p><span>78%</span></p></td><td><p><span>18%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2021</span></p></td></tr><tr><td><p><span>.monster</span></p></td><td><p><span>80%</span></p></td><td><p><span>17%</span></p></td><td><p><span>96%</span></p></td><td><p><span>2019</span></p></td></tr><tr><td><p><span>.cyou</span></p></td><td><p><span>34%</span></p></td><td><p><span>62%</span></p></td><td><p><span>96%</span></p></td><td><p><span>2020</span></p></td></tr><tr><td><p><span>.wiki</span></p></td><td><p><span>69%</span></p></td><td><p><span>26%</span></p></td><td><p><span>95%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.makeup</span></p></td><td><p><span>32%</span></p></td><td><p><span>63%</span></p></td><td><p><span>95%</span></p></td><td><p><span>2021</span></p></td></tr></tbody></table>
    <div>
      <h2>Email and Top-Level Domains history</h2>
      <a href="#email-and-top-level-domains-history">
        
      </a>
    </div>
    <p>In 1971, <a href="https://web.archive.org/web/20140209064041/http://openmap.bbn.com/~tomlinso/ray/firstemailframe.html">Ray Tomlinson</a> sent the first networked email over <a href="https://en.wikipedia.org/wiki/ARPANET">ARPANET</a>, using the @ character in the address. Five decades later, email remains relevant but also a key entry point for attackers.</p><p>Before the advent of the World Wide Web, email standardization and growth in the 1980s, especially within academia and military communities, led to interoperability. Fast forward 40 years, and this interoperability is once again a hot topic, with platforms like Threads, Mastodon, and other social media services aiming for the open communication that Jack Dorsey envisioned for Twitter. So, in 2024, it's clear that social media, messaging apps like Slack, Teams, Google Chat, and others haven't killed email, just as “video didn’t kill the <a href="https://en.wikipedia.org/wiki/Video_Killed_the_Radio_Star">radio star</a>.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ASRLNx8eaExAQ0EPDrJPi/f27726ec53a5697eb9d58202828837b9/blogcfcom.png" />
            
            </figure><p>The structure of a domain name.</p><p>The domain name system, managed by ICANN, encompasses a variety of TLDs, from the classic “.<a href="https://en.wikipedia.org/wiki/.com">com</a>” (1985) to the newer generic options. There are also the country-specific (<a href="https://en.wikipedia.org/wiki/Country_code_top-level_domain">ccTLDs</a>), where the Internet Assigned Numbers Authority (<a href="https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority">IANA</a>) <a href="https://icannwiki.org/Country_code_top-level_domain#ccTLDs_and_ICANN">is responsible</a> for determining an appropriate trustee for each ccTLD. An extensive 2014 expansion by <a href="https://newgtlds.icann.org/en/about">ICANN</a> was designed to "increase competition and choice in the domain name space," introducing numerous new options for specific professional, business, and informational purposes, which in turn, also opened up new possibilities for phishing attempts.</p>
    <div>
      <h2>3.4 billion unwanted emails</h2>
      <a href="#3-4-billion-unwanted-emails">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloud Email Security</a> service is helping protect our customers, and that also comes with insights. In 2022, Cloudflare blocked 2.4 billion unwanted emails, and in 2023 that number rose to over 3.4 billion unwanted emails, 26% of all messages processed. This total includes spam, malicious, and "<a href="https://en.wikipedia.org/wiki/Bulk_email_software">bulk</a>" (practice of sending a single email message, unsolicited or solicited, to a large number of recipients simultaneously) emails. That means an average of 9.3 million per day, 6500 per minute, 108 per second.</p><p>Bear in mind that new customers also make the numbers grow — in this case, driving a 42% increase in unwanted emails from 2022 to 2023. But this gives a sense of scale in this email area. Those unwanted emails can include malicious attacks that are difficult to detect, becoming more frequent, and can have devastating consequences for individuals and businesses that fall victim to them. Below, we’ll give more details on email threats, where malicious messages account for almost 3% of emails averaged across all of 2023 and it shows a growth tendency during the year, with higher percentages in the last months of the year. Let's take a closer look.</p>
    <div>
      <h2>Top phishing TLDs (and types of TLDs)</h2>
      <a href="#top-phishing-tlds-and-types-of-tlds">
        
      </a>
    </div>
    <p>First, let’s start with an 2023 overview of <a href="https://www.cloudflare.com/learning/dns/top-level-domain/">top level domains</a> with a high percentage of spam and malicious messages. Despite excluding TLDs with fewer than 20,000 emails, our analysis covers unwanted emails considered to be spam and malicious from more than 350 different TLDs (and yes, there are <a href="https://www.iana.org/domains/root/db">many more</a>).</p><p>A quick overview highlights the TLDs with the highest rates of spam and malicious attacks as a proportion of their outbound email, those with the largest volume share of spam or malicious emails, and those with the highest rates of just-malicious and just-spam TLD senders. It reveals that newer TLDs, especially those associated with the beauty industry (generally <a href="https://www.prnewswire.com/news-releases/domain-makeovers-begin-with-beauty-hair-skin-and-makeup-301182816.html">available since 2021 and serving a booming industry</a>), have the highest rates as a proportion of their emails. However, it's relevant to recognize that “.com” accounts for 67% of all spam and malicious emails. Malicious emails often originate from recently created generic TLDs like “.bar”, “.makeup”, or “.cyou”, as well as certain country-code TLDs (ccTLDs) employed beyond their geographical implications.</p><p></p><p>Focusing on volume share, “.com” dominates the spam + malicious list at 67%, and is joined in the top 3 by another “classic” gTLD, “.net”, at 4%. They also lead by volume when we look separately at the malicious (68% of all malicious emails are “.com” and “.net”) and spam (71%) categories, as shown below. All of the generic TLDs introduced since 2014 represent 13.4% of spam and malicious and over 14% of only malicious emails. These new TLDs (most of them are only available since 2016) are notable sources of both spam and malicious messages. Meanwhile, country-code TLDs contribute to more than 12% of both categories of unwanted emails.</p><p>This breakdown highlights the critical role of both established and new generic TLDs, which surpass older ccTLDs in terms of malicious emails, pointing to the changing dynamics of email-based threats.</p><table><colgroup><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Type of TLDs</span></p></td><td><p><span>Spam</span></p></td><td><p><span>Malicious </span></p></td><td><p><span>Spam + malicious</span></p></td></tr><tr><td><p><span>ccTLDs</span></p></td><td><p><span>13%</span></p></td><td><p><span>12%</span></p></td><td><p><span>12%</span></p></td></tr><tr><td><p><span>.com and .net only</span></p></td><td><p><span>71%</span></p></td><td><p><span>68%</span></p></td><td><p><span>71%</span></p></td></tr><tr><td><p><span>new gTLDs </span></p></td><td><p><span>13%</span></p></td><td><p><span>14%</span></p></td><td><p><span>13.4%</span></p></td></tr></tbody></table><p>That said, “.shop” deserves a highlight of its own. The TLD, which has been available <a href="https://en.wikipedia.org/wiki/.shop">since 2016</a>, is #2 by volume of spam and malicious emails, accounting for 5% of all of those emails. It also represents, when we separate those two categories, 5% of all malicious emails, and 5% of all spam emails. As we’re going to see below, its influence is growing.</p>
    <div>
      <h2>Full 2023 top 50 spam &amp; malicious TLDs list</h2>
      <a href="#full-2023-top-50-spam-malicious-tlds-list">
        
      </a>
    </div>
    <p>For a more detailed perspective, below we present the top 50 TLDs with the highest percentages of spam and malicious emails during 2023. We also include a breakdown of those two categories.</p><p>It’s noticeable that even outside the top 10, other recent generic TLDs are also higher in the ranking, such as “.autos” (the #1 in the spam list), “.today”, “.bid” or “.cam”. TLDs that seem to promise entertainment or fun or are just leisure or recreational related (including “.fun” itself), occupy a position in our top 50 ranking.</p><p></p>
    <div>
      <h2>Change in spam &amp; malicious TLD patterns</h2>
      <a href="#change-in-spam-malicious-tld-patterns">
        
      </a>
    </div>
    <p>Let's look at TLDs where spam + malicious emails comprised the largest share of total messages from that TLD, and how that list of TLDs changed from the first half of 2023 to the second half. This shows which TLDs were most problematic at different times during the year.</p><p>Highlighted in <b>bold</b> in the following table are those TLDs that climbed in the rankings for the percentage of spam and malicious emails from July to December 2023, compared with January to June. Generic TLDs “.uno”, “.makeup” and “.directory” appeared in the top list and in higher positions for the first time in the last six months of the year.</p><p></p><p>From the rankings, it's clear that the recent generic TLDs have the highest spam and malicious percentage of all emails. The top 10 TLDs in both halves of 2023 are all recent and generic, with several introduced since 2021.</p><p>Reasons for the prominence of these gTLDs include the availability of <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> that can seem legitimate or mimic well-known brands, as we explain in this <a href="/50-most-impersonated-brands-protect-phishing">blog post</a>. Cybercriminals often use popular or catchy words. Some gTLDs allow anonymous registration. Their low cost and the delay in updated security systems to recognize new gTLDs as spam and malicious sources also play a role — note that, as we’ve seen, cyber criminals also like to change TLDs and methods.</p>
    <div>
      <h2>The impact of a lawsuit?</h2>
      <a href="#the-impact-of-a-lawsuit">
        
      </a>
    </div>
    <p>There's also been a change in the types of domains with the highest malicious percentage in 2023, possibly due to Meta's <a href="https://krebsonsecurity.com/2023/05/phishing-domains-tanked-after-meta-sued-freenom/?cf_target_id=C13ADC4DD499FF8D0CEE849D9B49B413">lawsuit</a> against Freenom, filed in December 2022 and refiled in March 2023. Freenom provided domain name registry services for free in five ccTLDs, which wound up being used for purposes beyond local businesses or content: “.cf” (Central African Republic), “.ga” (Gabon), “.gq” (Equatorial Guinea), “.ml” (Mali), and “.tk” (Tokelau). However, Freenom <a href="https://www.netcraft.com/blog/impact-of-freenom-halting-registrations-on-cybercrime/">stopped</a> new registrations during 2023 following the lawsuit, and in February 2024, <a href="https://web.archive.org/web/20240213203456/https://www.freenom.com/en/freenom_pressstatement_02122024_v0100.pdf">announced</a> its decision to exit the domain name business.</p><p>Focusing on Freenom TLDs, which appeared in our top 50 ranking only in the first half of 2023, we see a clear shift. Since October, these TLDs have become less relevant in terms of all emails, including malicious and spam percentages. In February 2023, they accounted for 0.17% of all malicious emails we tracked, and 0.04% of all spam and malicious. Their presence has decreased since then, becoming almost non-existent in email volume in September and October, similar to <a href="https://krebsonsecurity.com/2023/05/phishing-domains-tanked-after-meta-sued-freenom/">other analyses</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MTEAWpk1xTLb2KbcFi20I/21cd4c1ef1b10d4ae2af4fb5cb0b6e56/Screenshot-2024-03-26-at-10.22.18.png" />
            
            </figure>
    <div>
      <h2>TLDs ordered by volume of spam + malicious</h2>
      <a href="#tlds-ordered-by-volume-of-spam-malicious">
        
      </a>
    </div>
    <p>In addition to looking at their share, another way to examine the data is to identify the TLDs that have a higher volume of spam and malicious emails — the next table is ordered that way. This means that we are able to show more familiar (and much older) TLDs, such as “.com”. We've included here the percentage of all emails in any given TLD that are classified as spam or malicious, and also spam + malicious to spotlight those that may require more caution. For instance, with high volume “.shop”, “.no”, “.click”, “.beauty”, “.top”, “.monster”, “.autos”, and “.today” stand out with a higher spam and malicious percentage (and also only malicious email percentage).</p><p>In the realm of country-code TLDs, Norway’s “.no” leads in spam, followed by China’s “.cn”, Russia’s “.ru”, Ukraine’s “.ua”, and Anguilla’s “<a href="https://www.cloudflare.com/application-services/products/registrar/buy-ai-domains/">.ai</a>”, which recently has been used more for artificial intelligence-related domains than for the country itself.</p><p>In <b>bold</b> and <b>red</b>, we’ve highlighted the TLDs where spam + malicious represents more than 20% of all emails in that TLD — already what we consider a high number for domains with a lot of emails.</p><p></p>
    <div>
      <h2>The curious case of “.gov” email spoofing</h2>
      <a href="#the-curious-case-of-gov-email-spoofing">
        
      </a>
    </div>
    <p>When we concentrate our research on message volume to identify TLDs with more malicious emails blocked by our Cloud Email Security service, we discover a trend related to “.gov”.</p><table><colgroup><col></col><col></col></colgroup><tbody><tr><td><p><span>TLDs ordered by malicious email volume</span></p></td><td><p><span>% of all malicious emails</span></p></td></tr><tr><td><p><span>.com</span></p></td><td><p><span>63%</span></p></td></tr><tr><td><p><span>.net</span></p></td><td><p><span>5%</span></p></td></tr><tr><td><p><span>.shop</span></p></td><td><p><span>5%</span></p></td></tr><tr><td><p><span>.org</span></p></td><td><p><span>3%</span></p></td></tr><tr><td><p><span>.gov</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>.ru</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>.jp</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>.click</span></p></td><td><p><span>1%</span></p></td></tr><tr><td><p><span>.best</span></p></td><td><p><span>0.9%</span></p></td></tr><tr><td><p><span>.beauty</span></p></td><td><p><span>0.8%</span></p></td></tr></tbody></table><p>The first three domains, ".com" (63%), ".net" (5%), and ".shop" (5%), were previously seen in our rankings and are not surprising. However, in fourth place is "<a href="https://www.cloudflare.com/application-services/products/registrar/buy-org-domains/">.org</a>", known for being used by non-profit and other similar organizations, but it has an open registration policy. In fifth place is ".gov", used only by the US government and administered by <a href="https://en.wikipedia.org/wiki/Cybersecurity_and_Infrastructure_Security_Agency">CISA</a>. Our investigation suggests that it appears in the ranking because of typical attacks where cybercriminals pretend to be a legitimate address (<a href="https://www.cloudflare.com/learning/email-security/what-is-email-spoofing/">email spoofing</a>, creation of email messages with a forged sender address). In this case, they use ".gov" when launching attacks.</p><p>The spoofing behavior linked to ".gov" is similar to that of other TLDs. It includes fake senders failing <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF validation</a> and other DNS-based authentication methods, along with various other types of attacks. An email failing SPF, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a>, and <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC</a> checks typically indicates that a malicious sender is using an unauthorized IP, domain, or both. So, there are more straightforward ways to block spoofed emails without examining their content for malicious elements.</p>
    <div>
      <h2>Ranking TLDs by proportions of malicious and spam email in 2023</h2>
      <a href="#ranking-tlds-by-proportions-of-malicious-and-spam-email-in-2023">
        
      </a>
    </div>
    <p>In this section, we have included two lists: one ranks TLDs by the highest percentage of malicious emails — those you should exercise greater caution with; the second ranks TLDs by just their spam percentage. These contrast with the previous top 50 list ordered by combined spam and malicious percentages. In the case of malicious emails, the top 3 with the highest percentage are all generic TLDs. The #1 was “.bar”, with 70% of all emails being categorized as malicious, followed by “.makeup”, and “.cyou” — marketed as the phrase "see you”.</p><p>The malicious list also includes some country-code TLDs (ccTLDs) not primarily used for country-related topics, like .ml (Mali), .om (Oman), and .pw (Palau). The list also includes other ccTLDs such as .ir (Iran) and .kg (Kyrgyzstan), .lk (Sri Lanka).</p><p>In the spam realm, it’s “autos”, with 93%, and other generic TLDs such as “.today”, and “.directory” that take the first three spots, also seeing shares over 90%.</p><p></p>
    <div>
      <h2>How it stands in 2024: new higher-risk TLDs</h2>
      <a href="#how-it-stands-in-2024-new-higher-risk-tlds">
        
      </a>
    </div>
    <p>2024 has seen new players enter the high-risk zone for unwanted emails. In this list we have only included the new TLDs that weren’t in the top 50 during 2023, and joined the list in January. New entrants include Samoa's “.ws”, Indonesia's “.id” (also used because of its “identification” meaning), and the Cocos Islands' “.cc”. These ccTLDs, often used for more than just country-related purposes, have shown high percentages of malicious emails, ranging from 20% (.cc) to 95% (.ws) of all emails.</p><table><colgroup><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>January 2024: Newer TLDs in the top 50 list</span></p></td></tr><tr><td><p><span>TLD</span></p></td><td><p><span>Spam %</span></p></td><td><p><span>Malicious %</span></p></td><td><p><span>Spam + mal %</span></p></td></tr><tr><td><p><span>.ws</span></p></td><td><p><span>3%</span></p></td><td><p><span>95%</span></p></td><td><p><span>98%</span></p></td></tr><tr><td><p><span>.company</span></p></td><td><p><span>96%</span></p></td><td><p><span>0%</span></p></td><td><p><span>96%</span></p></td></tr><tr><td><p><span>.digital</span></p></td><td><p><span>72%</span></p></td><td><p><span>2%</span></p></td><td><p><span>74%</span></p></td></tr><tr><td><p><span>.pro</span></p></td><td><p><span>66%</span></p></td><td><p><span>6%</span></p></td><td><p><span>73%</span></p></td></tr><tr><td><p><span>.tz</span></p></td><td><p><span>62%</span></p></td><td><p><span>4%</span></p></td><td><p><span>65%</span></p></td></tr><tr><td><p><span>.id</span></p></td><td><p><span>13%</span></p></td><td><p><span>39%</span></p></td><td><p><span>51%</span></p></td></tr><tr><td><p><span>.cc</span></p></td><td><p><span>25%</span></p></td><td><p><span>21%</span></p></td><td><p><span>46%</span></p></td></tr><tr><td><p><span>.space</span></p></td><td><p><span>32%</span></p></td><td><p><span>8%</span></p></td><td><p><span>40%</span></p></td></tr><tr><td><p><span>.enterprises</span></p></td><td><p><span>2%</span></p></td><td><p><span>37%</span></p></td><td><p><span>40%</span></p></td></tr><tr><td><p><span>.lv</span></p></td><td><p><span>30%</span></p></td><td><p><span>1%</span></p></td><td><p><span>30%</span></p></td></tr><tr><td><p><span>.cn</span></p></td><td><p><span>26%</span></p></td><td><p><span>3%</span></p></td><td><p><span>29%</span></p></td></tr><tr><td><p><span>.jo</span></p></td><td><p><span>27%</span></p></td><td><p><span>1%</span></p></td><td><p><span>28%</span></p></td></tr><tr><td><p><span>.info</span></p></td><td><p><span>21%</span></p></td><td><p><span>5%</span></p></td><td><p><span>26%</span></p></td></tr><tr><td><p><span>.su</span></p></td><td><p><span>20%</span></p></td><td><p><span>5%</span></p></td><td><p><span>25%</span></p></td></tr><tr><td><p><span>.ua</span></p></td><td><p><span>23%</span></p></td><td><p><span>1%</span></p></td><td><p><span>24%</span></p></td></tr><tr><td><p><span>.museum</span></p></td><td><p><span>0%</span></p></td><td><p><span>24%</span></p></td><td><p><span>24%</span></p></td></tr><tr><td><p><span>.biz</span></p></td><td><p><span>16%</span></p></td><td><p><span>7%</span></p></td><td><p><span>24%</span></p></td></tr><tr><td><p><span>.se</span></p></td><td><p><span>23%</span></p></td><td><p><span>0%</span></p></td><td><p><span>23%</span></p></td></tr><tr><td><p><span>.ai</span></p></td><td><p><span>21%</span></p></td><td><p><span>0%</span></p></td><td><p><span>21%</span></p></td></tr></tbody></table>
    <div>
      <h2>Overview of email threat trends since 2023</h2>
      <a href="#overview-of-email-threat-trends-since-2023">
        
      </a>
    </div>
    <p>With Cloudflare's Cloud Email Security, we gain insight into the broader email landscape over the past months. The <b>spam</b> percentage of all emails stood at <b>8.58%</b> in 2023. As mentioned before, keep in mind with these percentages that our protection typically kicks in after other email providers’ filters have already removed some spam and malicious emails.</p><p>How about malicious emails? Almost <b>3%</b> of all emails were flagged as <b>malicious</b> during 2023, with the highest percentages occurring in Q4. Here’s the “malicious” evolution, where we’re also including the January and February 2024 perspective:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4B6rev8c7oe4xZyNsMTcAK/93446b6b094f59606df5b0ab6b6de154/maliciousbymonth.png" />
            
            </figure><p>The week before Christmas and the first week of 2024 experienced a significant spike in malicious emails, reaching an average of 7% and 8% across the weeks, respectively. Not surprisingly, there was a noticeable decrease during Christmas week, when it dropped to 3%. Other significant increases in the percentage of malicious emails were observed the week before Valentine's Day, the first week of September (coinciding with returns to work and school in the Northern Hemisphere), and late October.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RhyfKbvE1oa2Qu906JIHw/fce0efe7a85203ce6d3480b100bdaddb/weeklymalicious.png" />
            
            </figure>
    <div>
      <h2>Threat categories in 2023</h2>
      <a href="#threat-categories-in-2023">
        
      </a>
    </div>
    <p>We can also look to different types of threats in 2023. Links were present in 49% of all threats. Other categories included extortion (36%), identity deception (27%), credential harvesting (23%), and brand impersonation (18%). These categories are defined and explored in detail in Cloudflare's <a href="/2023-phishing-report/">2023 phishing threats report</a>. Extortion saw the most growth in Q4, especially in November and December reaching 38% from 7% of all threats in Q1 2023.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6icrLcHPdHqa4ooH79l7Wx/500f69ca538ce0f6fdcbb651e2655315/malthreat.png" />
            
            </figure>
    <div>
      <h2>Other trends: Attachments are still popular</h2>
      <a href="#other-trends-attachments-are-still-popular">
        
      </a>
    </div>
    <p>Other less “threatening” trends show that 20% of all emails included attachments (as the next chart shows), while 82% contained links in the body. Additionally, 31% were composed in plain text, and 18% featured HTML, which allows for enhanced formatting and visuals. 39% of all emails used remote content.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12eXy3zGva3fMxQo0GKqKw/3b06faebc6cec5b6e5dd95ff38cd67c7/emailcharact.png" />
            
            </figure>
    <div>
      <h2>Conclusion: Be cautious, prepared, safe</h2>
      <a href="#conclusion-be-cautious-prepared-safe">
        
      </a>
    </div>
    <p>The landscape of spam and malicious (or phishing) emails constantly evolves alongside technology, the Internet, user behaviors, use cases, and cybercriminals. As we’ve seen through <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare’s Cloud Email Security insights</a>, new generic TLDs have emerged as preferred channels for these malicious activities, highlighting the need for vigilance when dealing with emails from unfamiliar domains.</p><p>There's no shortage of advice on <a href="/stay-safe-phishing-attacks">staying safe from phishing</a>. Email remains a ubiquitous yet highly exploited tool in daily business operations. Cybercriminals often bait users into clicking malicious links within emails, a tactic used by both sophisticated criminal organizations and novice attackers. So, always exercise caution online.</p><p>Cloudflare's Cloud Email Security provides insights that underscore the importance of robust cybersecurity infrastructure in fighting the dynamic tactics of phishing attacks.</p><p>If you want to learn more about email security, you can check <a href="https://radar.cloudflare.com/email-security">Cloudflare Radar’s new email section</a>, visit our <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">Learning Center</a> or reach out for a complimentary phishing <a href="https://www.cloudflare.com/lp/emailsecurity/">risk assessment</a> for your organization.</p><p><i>(Contributors to this blog post include Jeremy Eckman, Phil Syme, and Oren Falkowitz.)</i></p> ]]></content:encoded>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">3Hx7frhlsXSPEICR3DLVtJ</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Defensive AI: Cloudflare’s framework for defending against next-gen threats]]></title>
            <link>https://blog.cloudflare.com/defensive-ai/</link>
            <pubDate>Mon, 04 Mar 2024 14:00:24 GMT</pubDate>
            <description><![CDATA[ From identifying phishing attempts to protect applications and APIs, Cloudflare uses AI to improve the effectiveness of its security solutions to fight against new and more sophisticated attacks ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xVD4cmhSUcJddNAFw2AJc/6fb1537ad293d5d4eee9059aae0eec9b/Personalized-defensive-AI.png" />
            
            </figure><p>Generative AI has captured the imagination of the world by being able to produce poetry, screenplays, or imagery. These tools can be used to improve human productivity for good causes, but they can also be employed by malicious actors to carry out sophisticated attacks.</p><p>We are witnessing phishing attacks and social engineering becoming more sophisticated as attackers tap into powerful new tools to generate credible content or interact with humans as if it was a real person. Attackers can use AI to build boutique tooling made for attacking specific sites with the intent of harvesting proprietary data and taking over user accounts.</p><p>To protect against these new challenges, we need new and more sophisticated security tools: this is how Defensive AI was born. Defensive AI is the framework Cloudflare uses when thinking about how intelligent systems can improve the effectiveness of our security solutions. The key to Defensive AI is data generated by Cloudflare’s vast network, whether generally across our entire network or specific to individual customer traffic.</p><p>At Cloudflare, we use AI to increase the level of protection across all security areas, ranging from <a href="https://www.cloudflare.com/application-services/solutions/">application security</a> to email security and our <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>. This includes creating customized protection for every customer for API or email security, or using our huge amount of attack data to train models to detect application attacks that haven’t been discovered yet.</p><p>In the following sections, we will provide examples of how we designed the latest generation of security products that leverage AI to secure against AI-powered attacks.</p>
    <div>
      <h3>Protecting APIs with anomaly detection</h3>
      <a href="#protecting-apis-with-anomaly-detection">
        
      </a>
    </div>
    <p>APIs power the modern Web, comprising <a href="/2024-api-security-report/">57% of dynamic traffic</a> across the Cloudflare network, up from 52% in 2021. While APIs aren’t a new technology, securing them differs from securing a traditional web application. Because APIs offer easy programmatic access by design and are growing in popularity, fraudsters and threat actors have pivoted to targeting APIs. Security teams must now counter this rising threat. Importantly, each API is usually unique in its purpose and usage, and therefore <a href="https://www.cloudflare.com/application-services/solutions/api-security/">securing APIs</a> can take an inordinate amount of time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ojHc36uSFsnCBr870kK38/f4b7df6df5c60ffb087255ffb442e5e3/Screenshot-2024-03-01-at-1.39.29-PM.png" />
            
            </figure><p>Cloudflare is announcing the development of API Anomaly Detection for <a href="/api-gateway/">API Gateway</a> to protect APIs from attacks designed to damage applications, take over accounts, or <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate data</a>. API Gateway provides a layer of protection between your hosted APIs and every device that interfaces with them, giving you the visibility, control, and security tools you need to manage your APIs.</p><p>API Anomaly Detection is an upcoming, ML-powered feature in our API Gateway product suite and a natural successor to <a href="/api-sequence-analytics">Sequence Analytics</a>. In order to protect APIs at scale, API Anomaly Detection learns an application’s business logic by analyzing client API request sequences. It then builds a model of what a sequence of expected requests looks like for that application. The resulting traffic model is used to identify attacks that deviate from the expected client behavior. As a result, API Gateway can use its <a href="https://developers.cloudflare.com/api-shield/security/sequence-mitigation/">Sequence Mitigation</a> functionality to enforce the learned model of the application’s intended business logic, stopping attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/edeVw346MG6dZbjaDt97L/263e9c18c51f5320ce6e0c1d9ab957df/Screenshot-2024-03-01-at-2.01.25-PM-1.png" />
            
            </figure><p>While we’re still developing API Anomaly Detection, API Gateway customers can sign up <a href="https://www.cloudflare.com/lp/api-anomaly-detection/">here</a> to be included in the beta for API Anomaly Detection. Today, customers can get started with Sequence Analytics and Sequence Mitigation by reviewing the <a href="https://developers.cloudflare.com/api-shield/security/">docs</a>. Enterprise customers that haven’t purchased API Gateway can <a href="http://dash.cloudflare.com/?to=/:account/:zone/security/api-shield">self-start a trial</a> in the Cloudflare Dashboard, or contact their account manager for more information.</p>
    <div>
      <h3>Identifying unknown application vulnerabilities</h3>
      <a href="#identifying-unknown-application-vulnerabilities">
        
      </a>
    </div>
    <p>Another area where AI improves security is in our <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall (WAF)</a>. Cloudflare processes 55 million HTTP requests per second on average and has an unparalleled visibility into attacks and exploits across the world targeting a wide range of applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3oTIWUwe5Em3tD4ACksp6b/0036dcdf5af715f4095ffb14ae9b3769/Screenshot-2024-03-01-at-1.41.23-PM.png" />
            
            </figure><p>One of the big challenges with the WAF is adding protections for new vulnerabilities and false positives. A WAF is a collection of rules designed to identify attacks directed at web applications. New vulnerabilities are discovered daily and at Cloudflare we have a team of security analysts that create new rules when vulnerabilities are discovered. However, manually creating rules takes time — usually hours — leaving applications potentially vulnerable until a protection is in place. The other problem is that attackers continuously evolve and mutate existing attack payloads that can potentially bypass existing rules.</p><p>This is why Cloudflare has, for years, leveraged machine learning models that constantly learn from the latest attacks, deploying mitigations without the need for manual rule creation. This can be seen, for example, in our <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">WAF Attack Score</a> solution. WAF Attack Score is based on an ML model trained on attack traffic identified on the Cloudflare network. The resulting classifier allows us to identify variations and bypasses of existing attacks as well as extending the protection to <a href="/how-cloudflares-ai-waf-proactively-detected-ivanti-connect-secure-critical-zero-day-vulnerability">new and undiscovered attacks</a>. Recently, we have made Attack Score <a href="/waf-attack-score-for-business-plan">available to all Enterprise and Business plans</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25Jw91tB0o7lKhsgzvbqPV/748a7365c126ba03e2382b3eff988c37/Screenshot-2024-03-01-at-18.16.22.png" />
            
            </figure><p><i>Attack Score uses AI to classify each HTTP request based on the likelihood that it’s malicious</i></p><p>While the contribution of security analysts is indispensable, in the era of AI and rapidly evolving attack payloads, a <a href="https://www.cloudflare.com/cybersecurity-risk-management/">robust security posture</a> demands solutions that do not rely on human operators to write rules for each novel threat. Combining Attack Score with traditional signature-based rules is an example of how intelligent systems can support tasks carried out by humans. Attack Score identifies new malicious payloads which can be used by analysts to optimize rules that, in turn, provide better training data for our AI models. This creates a reinforcing positive feedback loop improving the overall protection and response time of our WAF.</p><p>Long term, we will adapt the AI model to account for customer-specific traffic characteristics to better identify deviations from normal and benign traffic.</p>
    <div>
      <h3>Using AI to fight phishing</h3>
      <a href="#using-ai-to-fight-phishing">
        
      </a>
    </div>
    <p>Email is one of the most effective vectors leveraged by bad actors with the US Cybersecurity and Infrastructure Security Agency (<a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>) reporting that 90% of cyber attacks start with phishing and Cloudflare Email Security <a href="https://radar.cloudflare.com/year-in-review/2023#malicious-emails">marking 2.6% of 2023's emails as malicious</a>. The rise of AI-enhanced attacks are making traditional email security providers obsolete, as threat actors can now craft phishing emails that are more credible than ever with little to no language errors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27B73JPLutOrg6shC9gZnh/3e49607d69ce330333204c3d061d9fa5/Screenshot-2024-03-01-at-1.41.30-PM.png" />
            
            </figure><p>Cloudflare <a href="https://developers.cloudflare.com/email-security/">Email Security</a> is a cloud-native service that stops phishing attacks across all threat vectors. Cloudflare’s email security product continues to protect customers with its AI models, even as trends like Generative AI continue to evolve. Cloudflare’s models analyze all parts of a phishing attack to determine the risk posed to the end user. Some of our AI models are personalized for each customer while others are trained holistically. Privacy is paramount at Cloudflare, so only non-personally identifiable information is used by our tools for training. In 2023, <a href="/2023-phishing-report">Cloudflare processed approximately 13 billion</a>, and blocked 3.4 billion, emails, providing the email security product a rich dataset that can be used to train AI models.</p><p>Two detections that are part of our portfolio are Honeycomb and Labyrinth.</p><ul><li><p><i>Honeycomb</i> is a patented email sender domain reputation model. This service builds a graph of who is sending messages and builds a model to determine risk. Models are trained on specific customer traffic patterns, so every customer has AI models trained on what their good traffic looks like.</p></li><li><p><i>Labyrinth</i> uses ML to protect on a per-customer basis. Actors attempt to spoof emails from our clients’ valid partner companies.  We can gather a list with statistics of known &amp; good email senders for each of our clients. We can then detect the spoof attempts when the email is sent by someone from an unverified domain, but the domain mentioned in the email itself is a reference/verified domain.</p></li></ul><p>AI remains at the core of our email security product, and we are constantly improving the ways we leverage it within our product. If you want to get more information about how we are using our AI models to stop AI enhanced phishing attacks check out our blog post here.</p>
    <div>
      <h3>Zero-Trust security protected and powered by AI</h3>
      <a href="#zero-trust-security-protected-and-powered-by-ai">
        
      </a>
    </div>
    <p>Cloudflare <a href="https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> provides administrators the tools to protect access to their IT infrastructure by enforcing strict identity verification for every person and device regardless of whether they are sitting within or outside the network perimeter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qpOOjCeP6yqWtYrSgJdCu/4693906c9faf833a57db45672472f23d/Cloudflare-One-User-Risk-Scores_b.png" />
            
            </figure><p>One of the big challenges is to enforce strict access control while reducing the friction introduced by frequent verifications. Existing solutions also put pressure on IT teams that need to analyze log data to track how risk is evolving within their infrastructure. Sifting through a huge amount of data to find rare attacks requires large teams and substantial budgets.</p><p>Cloudflare simplifies this process by introducing behavior-based user risk scoring. Leveraging AI, we analyze real-time data to identify anomalies in the users’ behavior and signals that could lead to harms to the organization. This provides administrators with recommendations on how to tailor the security posture based on user behavior.</p><p>Zero Trust user risk scoring detects user activity and behaviors that could introduce risk to your organizations, systems, and data and assigns a score of Low, Medium, or High to the user involved. This approach is sometimes referred to as <a href="https://www.cloudflare.com/learning/security/what-is-ueba/">user and entity behavior analytics (UEBA)</a> and enables teams to detect and remediate possible account compromise, company policy violations, and other risky activity.</p><p>The first contextual behavior we are launching is “impossible travel”, which helps identify if a user’s credentials are being used in two locations that the user could not have traveled to in that period of time. These risk scores can be further extended in the future to highlight personalized behavior risks based on contextual information such as time of day usage patterns and access patterns to flag any anomalous behavior. Since all traffic would be proxying through your SWG, this can also be extended to resources which are being accessed, like an internal company repo.</p><p>We have an exciting launch during security week. <a href="/cf1-user-risk-score/">Check out this blog to learn more</a>.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>From application and email security to <a href="https://www.cloudflare.com/network-security/">network security</a> and Zero Trust, we are witnessing attackers leveraging new technologies to be more effective in achieving their goals. In the last few years, multiple Cloudflare product and engineering teams have adopted intelligent systems to better identify abuses and <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">increase protection</a>.</p><p>Besides the generative AI craze, AI is already a crucial part of how we defend digital assets against attacks and how we discourage bad actors.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Machine Learning]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">76ClOKhWKWuLLPML351f39</guid>
            <dc:creator>Daniele Molteni</dc:creator>
            <dc:creator>John Cosgrove</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Safeguarding your brand identity: Logo Matching for Brand Protection]]></title>
            <link>https://blog.cloudflare.com/safeguarding-your-brand-identity-logo-matching-for-brand-protection/</link>
            <pubDate>Thu, 15 Feb 2024 14:00:34 GMT</pubDate>
            <description><![CDATA[ Brand Protection's Logo Matching feature enables users to upload an image of the user’s logo or other brand image. The system scans URLs to discover matching logos and then presents the results for users to review ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In an era dominated by digital landscapes, protecting your brand’s identity has become more challenging than ever. Malicious actors regularly build lookalike websites, complete with official logos and <a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/">spoofed domains</a>, to try to dupe customers and employees. These kinds of <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing attacks</a> can damage your reputation, erode customer trust, or even result in data breaches.</p><p>In March 2023 we introduced Cloudflare’s Brand and Phishing Protection suite, beginning with <a href="/50-most-impersonated-brands-protect-phishing/">Brand Domain Name Alerts</a>. This tool recognizes so-called “confusable” domains (which can be nearly indistinguishable from their authentic counterparts) by sifting through the trillions of DNS requests passing through Cloudflare’s DNS resolver, 1.1.1.1. This helps brands and organizations stay ahead of malicious actors by spotting suspicious domains as soon as they appear in the wild.</p><p>Today we are excited to expand our Brand Protection toolkit with the addition of Logo Matching. Logo Matching is a powerful tool that allows brands to detect unauthorized logo usage: if Cloudflare detects your logo on an unauthorized site, you receive an immediate notification.</p><p>The new Logo Matching feature is a direct result of a frequent request from our users. Phishing websites often use official brand logos as part of their facade. In fact, the appearance of unauthorized logos is a strong signal that a hitherto dormant suspicious domain is being weaponized. Being able to identify these sites before they are widely distributed is a powerful tool in defending against phishing attacks. Organizations can use Cloudflare Gateway <a href="/2022-07-sms-phishing-attacks/">to block</a> employees from connecting to sites with a suspicious domain and unauthorized logo use.</p><p>Imagine having the power to fortify your brand's presence and reputation. By detecting instances where your logo is being exploited, you gain the upper hand in protecting your brand from potential fraud and phishing attacks.</p>
    <div>
      <h2>Getting started with Logo Matching</h2>
      <a href="#getting-started-with-logo-matching">
        
      </a>
    </div>
    <p>For most brands, the first step to leveraging Logo Matching will be to configure Domain Name Alerts. For example, we might decide to set up an alert for <i>example.com</i>, which will use fuzzy matching to detect lookalike, high-risk <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a>. All sites that trigger an alert are automatically analyzed by Cloudflare’s phishing scanner, which gathers technical information about each site, including SSL certificate data, HTTP request and response data, page performance data, <a href="https://www.cloudflare.com/learning/dns/dns-records/">DNS records</a>, and more — all of which inform a machine-learning based phishing risk analysis.</p><p>Logo Matching further extends this scan by looking for matching images. The system leverages image recognition algorithms to crawl through scanned domains, identifying matches even when images have undergone slight modifications or alterations.</p><p>Once configured, Domain Name Alerts and the scans they trigger will continue on an ongoing basis. In addition, Logo Matching monitors for images across all domains scanned by Cloudflare’s phishing scanner, including those scanned by other Brand Protection users, as well as scans initiated via the Cloudflare Radar URL scanner, and the <a href="https://developers.cloudflare.com/security-center/investigate/investigate-threats/">Investigate Portal</a> within Cloudflare’s Security Center dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Ho5Hl0b6xXd8TCObhVqnb/af1d3a4784b87fb16d531e636e0e9999/image4-6.png" />
            
            </figure>
    <div>
      <h2>How we built Logo Matching for Brand Protection</h2>
      <a href="#how-we-built-logo-matching-for-brand-protection">
        
      </a>
    </div>
    
    <div>
      <h3>Under the hood of our API Insights</h3>
      <a href="#under-the-hood-of-our-api-insights">
        
      </a>
    </div>
    <p>Now, let's dive deeper into the engine powering this feature – our Brand Protection API. This API serves as the backbone of the entire process. Not only does it enable users to submit logos and brand images for scanning, but it also orchestrates the complex matching process.</p><p>When a logo is submitted through the API, the Logo Matching feature not only identifies potential matches but also allows customers to save a query, providing an easy way to refer back to their queries and see the most recent results. If a customer chooses to save a query, the logo is swiftly added to our data storage in <a href="https://www.cloudflare.com/developer-platform/products/r2/">R2</a>, Cloudflare’s zero egress fee <a href="https://www.cloudflare.com/learning/cloud/what-is-object-storage/">object storage</a>. This foundational feature enables us to continuously provide updated results without the customer having to create a new query for the same logo.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48G6eXrF2XewJpjrlzbBdU/f327a4245d033aeebf6122095af8d92e/image2-11.png" />
            
            </figure><p>The API ensures real-time responses for logo submissions, simultaneously kick-starting our internal scanning pipelines. An image look-back ID is generated to facilitate seamless tracking and processing of logo submissions. This identifier allows us to keep a record of the submitted images, ensuring that we can efficiently manage and process them through our system.</p>
    <div>
      <h3>Scan result retrieval</h3>
      <a href="#scan-result-retrieval">
        
      </a>
    </div>
    <p>As images undergo scanning, the API remains the conduit for result retrieval. Its role here is to constantly monitor and provide the results in real time. During scanning, the API ensures users receive timely updates. If scanning is still in progress, a “still scanning” status is communicated. Upon completion, the API is designed to relay crucial information — details on matches if found, or a simple “no matches” declaration.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1FWft91GuiGRvUk3ZtxmxH/36e8fb3bf0c1b0a0f3c8af5005c572a0/image1-12.png" />
            
            </figure>
    <div>
      <h3>Storing and maintaining logo data</h3>
      <a href="#storing-and-maintaining-logo-data">
        
      </a>
    </div>
    <p>In the background, we maintain a vectorized version of all user-uploaded logos when the user query is saved. This system, acting as a logo matching subscriber, is entrusted with the responsibility of ensuring accurate and up-to-date logo matching.</p><p>To accomplish this, two strategies come into play. Firstly, the subscriber stays attuned to revisions in the logo set. It saves vectorized logo sets with every revision and regular checks are conducted by the subscriber to ensure alignment between the vectorized logos and those saved in the database.</p><p>While monitoring the query, the subscriber employs a diff-based strategy. This recalibrates the vectorized logo set against the current logos stored in the database, ensuring a seamless transition into processing.</p>
    <div>
      <h2>Shaping the future of brand protection: our roadmap ahead</h2>
      <a href="#shaping-the-future-of-brand-protection-our-roadmap-ahead">
        
      </a>
    </div>
    <p>With the introduction of the Logo Matching feature, Cloudflare’s Brand Protection suite advances to the next level of brand integrity management. By enabling you to detect and analyze, and act on unauthorized logo usage, we’re helping businesses to take better care of their brand identity.</p><p>At Cloudflare, we're committed to shaping a comprehensive brand protection solution that anticipates and mitigates risks proactively. In the future, we plan to add enhancements to our brand protection solution with features like automated cease and desist letters for swift legal action against unauthorized logo use, proactive domain monitoring upon onboarding, simplified reporting of brand impersonations and more.</p>
    <div>
      <h2>Getting started</h2>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>If you’re an Enterprise customer, <a href="https://www.cloudflare.com/lp/brandprotection/">sign up for Beta Access</a> for Brand protection now to gain access to private scanning for your domains, logo matching, save queries and set up alerts on matched domains. Learn more about Brand Protection <a href="https://developers.cloudflare.com/security-center/brand-protection/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Brand Protection]]></category>
            <category><![CDATA[Brand]]></category>
            <category><![CDATA[Fraud]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Image Recognition]]></category>
            <category><![CDATA[Machine Learning]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5yEDWpQ6C6r0cHoEee3Y6O</guid>
            <dc:creator>Alexandra Moraru</dc:creator>
        </item>
        <item>
            <title><![CDATA[An August reading list about online security and 2023 attacks landscape]]></title>
            <link>https://blog.cloudflare.com/an-august-reading-list-about-online-security-and-2023-attacks-landscape/</link>
            <pubDate>Mon, 21 Aug 2023 13:00:57 GMT</pubDate>
            <description><![CDATA[ Here is a reading list with 2023 trends, what you need to know about attacks, and a guide on how to stay protected using Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5aNzvtLI3LV7ChtfG0YMXf/de9ec3ca711ba9a8196a42cda8e1b159/image1-18.png" />
            
            </figure><p>In 2023, cybersecurity continues to be in most cases a need-to-have for those who don’t want to take chances on getting caught in a cyberattack and its consequences. Attacks have gotten more sophisticated, while conflicts (online and offline, and at the same time) continue, including in <a href="/one-year-of-war-in-ukraine/">Ukraine</a>. Governments have heightened their cyber warnings and put together strategies, including around critical infrastructure (including health and education). All of this, at a time when there were never so many online risks, but also people online — over five billion in July 2023, <a href="https://datareportal.com/reports/digital-2023-july-global-statshot">64.5%</a> of the now <a href="https://population.un.org/dataportal/data/indicators/49/locations/900/start/1950/end/2100/line/linetimeplotsingle">eight billion</a> that are the world’s total population.</p><p>Here we take a look at what we’ve been discussing in 2023, so far, in our Cloudflare blog related to attacks and online security in general, with several August reading list suggestions. From new trends, products, initiatives or partnerships, including <a href="/tag/ai/">AI</a> service safety, to <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">record-breaking blocked cyberattacks</a>. On that note, our AI hub (<a href="https://ai.cloudflare.com/">ai.cloudflare.com</a>) was just launched.</p><p>Throughout the year, Cloudflare has continued to onboard customers while they were <a href="https://www.cloudflare.com/under-attack-hotline/">being attacked</a>, and we have provided protection to many others, including once.net, responsible for the <a href="/how-cloudflare-scaled-and-protected-eurovision-2023-voting/">2023 Eurovision Song Contest online voting system</a> — the European event reached 162 million people.</p><p>Our global network — a.k.a. <a href="/welcome-to-the-supercloud-and-developer-week-2022/">Supercloud</a> — gives us a unique vantage point. Cloudflare’s extensive scale also helps enhance security, with preventive services powered by machine learning, like our recent <a href="https://www.cloudflare.com/waf/">WAF</a> attack scoring system to <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">stop attacks before they become known</a> or even <a href="/waf-content-scanning/">malware</a>.</p><p>Recently, we announced our presence in more than <a href="/cloudflare-connected-in-over-300-cities/">300 cities across over 100 countries</a>, with interconnections to over 12,000 networks and still growing. We provide services for around 20% of websites online and to millions of Internet properties.</p>
    <div>
      <h2>Attacks increasing. A readiness and trust game</h2>
      <a href="#attacks-increasing-a-readiness-and-trust-game">
        
      </a>
    </div>
    <p>Let’s start with providing some context. There are all sorts of attacks, but they have been, generally speaking, increasing. In Q2 2023, Cloudflare blocked an average of <b>140 billion</b> cyber threats per day. One year ago, when we wrote a <a href="/2022-attacks-an-august-reading-list-to-go-shields-up/">similar blog post</a>, it was 124 billion, a 13% increase year over year. Attackers are not holding back, with more sophisticated attacks rising, and sectors such as education or healthcare as the target.</p><p><a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">Artificial intelligence (AI)</a>, like machine learning, is not new, but it has been trending in 2023, and certain capabilities are more generally available. This has raised concerns about the <a href="https://www.reuters.com/technology/ai-being-used-hacking-misinfo-top-canadian-cyber-official-says-2023-07-20/">quality of deception</a> and even <a href="https://www.wired.com/story/artificial-intelligence-hacking-bruce-schneier/">AI hackers</a>.</p><p>This year, governments have also continued to release reports and warnings. In 2022, the US Cybersecurity and Infrastructure Security Agency (CISA) created the <a href="https://www.cisa.gov/shields-up">Shields Up</a> initiative in response to Russia's invasion of Ukraine. In March 2023, the Biden-Harris Administration released the <a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">National Cybersecurity Strategy</a> aimed at securing the Internet.</p><p>The <a href="https://www.gov.uk/government/publications/national-cyber-strategy-2022/national-cyber-security-strategy-2022">UK’s Cyber Strategy</a> was launched at the end of 2022, and in March of this year, a <a href="https://www.gov.uk/government/news/government-sets-out-strategy-to-protect-nhs-from-cyber-attacks">strategy</a> was released to specifically protect its National Health Service (NHS) from cyber attacks — in May it was time for the UK’s <a href="https://www.infosecurity-magazine.com/news/uk-military-security-by-design/">Ministry of Defence to do the same</a>. In Germany, the new <a href="https://www.auswaertiges-amt.de/en/aussenpolitik/digital-strategy/2551972">Digital Strategy</a> is from 2022, but the <a href="https://www.auswaertiges-amt.de/en/aussenpolitik/themen/-/2601730">Security Strategy</a> arrived in June. A similar scenario is seen in <a href="https://www.mofa.go.jp/fp/nsp/page1we_000081.html">Japan</a>, <a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/2023-2030-australian-cyber-security-strategy">Australia</a>, and others.</p><p>That said, here are the reading suggestions related to more general country related attacks, but also policy and trust cybersecurity:</p>
    <div>
      <h3>One year of war in Ukraine: Internet trends, attacks, and resilience (<a href="/one-year-of-war-in-ukraine/">✍️</a>)</h3>
      <a href="#one-year-of-war-in-ukraine-internet-trends-attacks-and-resilience">
        
      </a>
    </div>
    <p>This blog <a href="/one-year-of-war-in-ukraine/">post</a> reports on Internet insights during the war in Europe, and discusses how Ukraine's Internet remained resilient in spite of dozens of attacks, and disruptions in three different stages of the conflict.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2u3okH81n3Jot9rjymcUbJ/0db8d140be0740ffba8c2168f92e1bb7/image4-7.png" />
            
            </figure><p>Application-layer cyber attacks in Ukraine <a href="/one-year-of-war-in-ukraine/">rose 1,300%</a> in early March 2022 compared to pre-war levels.</p>
    <div>
      <h3>The White House’s National Cybersecurity Strategy asks the private sector to step up to fight cyber attacks. Cloudflare is ready (<a href="/the-white-houses-national-cybersecurity-strategy-asks-the-private-sector-to-step-up-to-fight-cyber-attacks-cloudflare-is-ready/">✍️</a>)</h3>
      <a href="#the-white-houses-national-cybersecurity-strategy-asks-the-private-sector-to-step-up-to-fight-cyber-attacks-cloudflare-is-ready">
        
      </a>
    </div>
    <p>The White House released in March 2023 the National Cybersecurity Strategy aimed at preserving and extending the open, free, global, interoperable, reliable, and securing the Internet. Cloudflare welcomed the Strategy, and the much-needed policy initiative, highlighting the need of defending critical infrastructure, where Zero Trust plays a big role. In the same month, <a href="/cloudflare-commitment-to-the-2023-summit-for-democracy/">Cloudflare announced its commitment to the 2023 Summit for Democracy</a>. Also related to these initiatives, in March 2022, we launched our very own <a href="/announcing-critical-infrastructure-defense/">Critical Infrastructure Defense Project</a> (CIDP), and in December 2022, Cloudflare launched <a href="/project-safekeeping/">Project Safekeeping</a>, offering <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust solutions</a> to certain eligible entities in Australia, Japan, Germany, Portugal and the United Kingdom.</p>
    <div>
      <h3>Secure by default: recommendations from the CISA’s newest guide, and how Cloudflare follows these principles to keep you secure <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/secure-by-default-understanding-new-cisa-guide/">✍️</a>)</h3>
      <a href="#secure-by-default-recommendations-from-the-cisas-newest-guide-and-how-cloudflare-follows-these-principles-to-keep-you-secure">
        
      </a>
    </div>
    <p>In <a href="/secure-by-default-understanding-new-cisa-guide/">this</a> April 2023 post we reviewed the “default secure” posture, and recommendations that were the focus of a <a href="https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf">recently published guide</a> jointly authored by several international agencies. It had US, UK, Australia, Canada, Germany, Netherlands, and New Zealand contributions. Long story short, using all sorts of tools, machine learning and a secure-by-default and by-design approach, and a few principles, will make all the difference.</p>
    <div>
      <h3>Nine years of Project Galileo and how the last year has changed it <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/nine-years-of-project-galileo-and-how-the-last-year-has-changed-it/">✍️</a>) + Project Galileo Report <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="https://radar.cloudflare.com/reports/project-galileo-9th-anniv">✍️</a>)</h3>
      <a href="#nine-years-of-project-galileo-and-how-the-last-year-has-changed-it-project-galileo-report">
        
      </a>
    </div>
    <p>For the ninth anniversary of our <a href="https://www.cloudflare.com/galileo/">Project Galileo</a> in June 2023, the focus turned towards providing access to affordable cybersecurity tools and sharing our learnings from protecting the most vulnerable communities. There are also Project Galileo <a href="https://www.cloudflare.com/project-galileo-case-studies/?cf_target_id=1D3DEA8242B8DDE138D5C8B53C65A067">case studies</a> and how it has made a difference, including to those in <a href="https://www.cloudflare.com/case-studies/dream-girl-foundation/">education and health</a>, <a href="https://www.cloudflare.com/case-studies/muzeon/">cultural</a>, <a href="https://www.cloudflare.com/case-studies/veterans-brotherhood/">veterans</a>’ services, <a href="https://www.cloudflare.com/case-studies/internet-archive/">Internet archives</a>, and <a href="https://www.cloudflare.com/case-studies/sin-embargo/">investigative journalism</a>. A <a href="https://radar.cloudflare.com/reports/project-galileo-9th-anniv">Cloudflare Radar Project Galileo report</a> was also disclosed, with some highlights worth mentioning:</p><ul><li><p>Between July 1, 2022, and May 5, 2023, Cloudflare mitigated 20 billion attacks against organizations protected under Project Galileo. This is an average of nearly 67.7 million cyber attacks per day over the last 10 months.</p></li><li><p>For LGBTQ+ organizations, we saw an average of 790,000 attacks mitigated per day over the last 10 months, with a majority of those classified as <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS</a> attacks.</p></li><li><p>Attacks targeting civil society organizations are generally increasing. We have broken down an attack aimed at a prominent organization, with the request volume climbing as high as 667,000 requests per second. Before and after this time the organization saw little to no traffic.</p></li><li><p>In Ukraine, spikes in traffic to organizations that provide emergency response and disaster relief coincide with bombings of the country over the 10-month period.</p></li></ul>
    <div>
      <h3>Project Cybersafe Schools: bringing security tools for free to small K-12 school districts in the US (<a href="/project-cybersafe-schools/">✍️</a>)</h3>
      <a href="#project-cybersafe-schools-bringing-security-tools-for-free-to-small-k-12-school-districts-in-the-us">
        
      </a>
    </div>
    <p>Already in August 2023, Cloudflare introduced an initiative aimed at small K-12 public school districts: <a href="https://www.cloudflare.com/lp/cybersafe-schools/">Project Cybersafe Schools</a>. Announced as part of the Back to School Safely: <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/07/biden-harris-administration-launches-new-efforts-to-strengthen-americas-k-12-schools-cybersecurity/">K-12 Cybersecurity Summit</a> at the White House on August 7, Project Cybersafe Schools will support eligible K-12 public school districts with a package of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> cybersecurity solutions — <i>for free</i>, and <i>with no time limit</i>. In Q2 2023, Cloudflare blocked an average of 70 million cyber threats each day targeting the U.S. education sector, and a 47%  increase in DDoS attacks quarter-over-quarter.</p><p>Privacy concerns also go hand in hand with security online, and we’ve provided further details on this topic earlier this year in relation to our investment in <a href="/investing-in-security-to-protect-data-privacy/">security to protect data privacy</a>. Cloudflare also <a href="/cloudflare-official-gdpr-code-of-conduct/">achieved</a> a new EU Cloud Code of Conduct privacy validation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5PZvxmDRt4KAHlsn8cvb0A/da6b90441479e91b548b0bb979806191/image2-12.png" />
            
            </figure><p>This is what a record-breaking DDoS attack (exceeding <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">71 million requests</a> per second) looks like.</p>
    <div>
      <h2>1. DDoS attacks &amp; solutions</h2>
      <a href="#1-ddos-attacks-solutions">
        
      </a>
    </div>
    
    <div>
      <h3>DDoS threat report for 2023 Q2 (<a href="/ddos-threat-report-2023-q2/">✍️</a>)</h3>
      <a href="#ddos-threat-report-for-2023-q2">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</a> (distributed denial-of-service) are not new, but they’re still one of the main tools used by attackers. In Q2 2023, Cloudflare witnessed an unprecedented escalation in DDoS attack sophistication, and our report delves into this phenomenon. Pro-Russian hacktivists REvil, Killnet and <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">Anonymous Sudan</a> joined forces to attack Western sites. Mitel vulnerability exploits surged by a whopping 532%, and attacks on crypto rocketed up by 600%. Also, more broadly, attacks exceeding three hours have increased by 103% quarter-over-quarter.</p><p><a href="/ddos-threat-report-2023-q2/">This</a> blog post and the corresponding <a href="https://radar.cloudflare.com/reports/ddos-2023-q2">Cloudflare Radar report</a> shed light on some of these trends. On the other hand, in our <a href="https://radar.cloudflare.com/reports/ddos-2023-q1">Q1 2023 DDoS threat report</a>, a surge in hyper-volumetric attacks that leverage a new generation of botnets that are comprised of Virtual Private Servers (VPS) was observed.</p>
    <div>
      <h3>Killnet and AnonymousSudan DDoS attack Australian university websites, and threaten more attacks — here’s what to do about it  (<a href="/ddos-attacks-on-australian-universities/">✍️</a>)</h3>
      <a href="#killnet-and-anonymoussudan-ddos-attack-australian-university-websites-and-threaten-more-attacks-heres-what-to-do-about-it">
        
      </a>
    </div>
    <p>In late March 2023, Cloudflare observed HTTP DDoS attacks targeting university websites in Australia. Universities were the first of several groups publicly targeted by the pro-Russian hacker group Killnet and their affiliate AnonymousSudan. This post not only shows a trend with these organized groups targeted attacks but also provides specific recommendations.</p><p>In January 2023, something similar was seen with increased cyberattacks to <a href="/cyberattacks-on-holocaust-educational-websites-increased-in-2022/">Holocaust educational websites</a> protected by Cloudflare’s Project Galileo.</p>
    <div>
      <h3>Uptick in healthcare organizations experiencing targeted DDoS attacks (<a href="/uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks/">✍️</a>)</h3>
      <a href="#uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks">
        
      </a>
    </div>
    <p>In early February 2023, Cloudflare, as well as other sources, observed an uptick in healthcare organizations targeted by a pro-Russian hacktivist group claiming to be Killnet. There was an increase in the number of these organizations seeking our help to defend against such attacks. Additionally, healthcare organizations that were already protected by Cloudflare experienced mitigated HTTP DDoS attacks.</p>
    <div>
      <h3>Cloudflare mitigates record-breaking 71 million request-per-second DDoS attack (<a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">✍️</a>)</h3>
      <a href="#cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack">
        
      </a>
    </div>
    <p>Also in early February, Cloudflare detected and mitigated dozens of hyper-volumetric DDoS attacks, one of those that became a record-breaking one. The majority of attacks peaked in the ballpark of 50-70 million requests per second (rps) with the largest exceeding 71Mrps. This was the largest reported HTTP DDoS attack on record to date, more than 54% higher than the previous reported record of 46M rps in June 2022.</p>
    <div>
      <h3>SLP: a new DDoS amplification vector in the wild (<a href="/slp-new-ddos-amplification-vector/">✍️</a>)</h3>
      <a href="#slp-a-new-ddos-amplification-vector-in-the-wild">
        
      </a>
    </div>
    <p>This blog post from April 2023 highlights how researchers have published the discovery of a new DDoS reflection/amplification attack vector leveraging the SLP protocol (<a href="https://en.wikipedia.org/wiki/Service_Location_Protocol">Service Location Protocol</a>). The prevalence of SLP-based DDoS attacks is also expected to rise, but our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">automated DDoS protection system</a> keeps Cloudflare customers safe.</p><p>Additionally, this year, also in April, a new and <a href="/network-analytics-v2-announcement/">improved Network Analytics dashboard</a> was introduced, providing security professionals insights into their DDoS attack and traffic landscape.</p>
    <div>
      <h2>2. Application level attacks &amp; WAF</h2>
      <a href="#2-application-level-attacks-waf">
        
      </a>
    </div>
    
    <div>
      <h3>The state of application security in 2023 (<a href="/application-security-2023/">✍️</a>)</h3>
      <a href="#the-state-of-application-security-in-2023">
        
      </a>
    </div>
    <p>For the second year in a row we published our <a href="/application-security-2023/">Application Security Report</a>. There’s a lot to unpack here, in a year when, according to <a href="https://news.netcraft.com/archives/2023/02/28/february-2023-web-server-survey.html">Netcraft</a>, Cloudflare became the most commonly used web server vendor within the top million sites (it has now a 22% market share). Here are some highlights:</p><ul><li><p>6% of daily HTTP requests (proxied by the Cloudflare network) are mitigated on average. It’s down two percentage points compared to last year.</p></li><li><p>DDoS mitigation accounts for more than 50% of all mitigated traffic, so it’s still the largest contributor to mitigated layer 7 (application layer) HTTP requests.</p></li><li><p>Compared to last year, however, mitigation by the Cloudflare WAF (<a href="https://www.cloudflare.com/application-services/products/waf/">Web Application Firewall</a>) has grown significantly, and now accounts for nearly 41% of mitigated requests.</p></li><li><p>HTTP Anomaly (examples include malformed method names, null byte characters in headers, etc.) is the most frequent layer 7 attack vectors mitigated by the WAF.</p></li><li><p>30% of HTTP traffic is automated (bot traffic). 55% of dynamic (non cacheable) traffic is API related. 65% of global API traffic is generated by browsers.</p></li><li><p>16% of non-verified bot HTTP traffic is mitigated.</p></li><li><p>HTTP Anomaly surpasses <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQLi</a> (code injection technique used to attack data-driven applications) as the most common attack vector on API endpoints. Brute force <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">account takeover attacks</a> are increasing. Also, Microsoft Exchange is attacked more than WordPress.</p></li></ul>
    <div>
      <h3>How Cloudflare can help stop malware before it reaches your app (<a href="/waf-content-scanning/">✍️</a>)</h3>
      <a href="#how-cloudflare-can-help-stop-malware-before-it-reaches-your-app">
        
      </a>
    </div>
    <p>In April 2023, we made the job of application security teams easier, by providing a content scanning engine integrated with our Web Application Firewall (WAF), so that malicious files being uploaded by end users, never reach origin servers in the first place. Since September 2022, our <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">Cloudflare WAF became smarter</a> in helping stop attacks before they are known.</p>
    <div>
      <h3>Announcing WAF Attack Score Lite and Security Analytics for business customers  (<a href="/waf-attack-score-for-business-plan/">✍️</a>)</h3>
      <a href="#announcing-waf-attack-score-lite-and-security-analytics-for-business-customers">
        
      </a>
    </div>
    <p>In March 2023, we <a href="/waf-attack-score-for-business-plan/">announced</a> that our machine learning <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">empowered WAF and Security analytics</a> view were made available to our Business plan customers, to help detect and stop attacks before they are known. In a nutshell: Early detection + Powerful mitigation = Safer Internet. Or:</p>
            <pre><code>early_detection = True
powerful_mitigation = True
safer_internet = early_detection and powerful_mitigation</code></pre>
            
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22VmDewiUvzDtIX0ZJ5bbn/7a638b27aea1488ca219ae738b9cc294/image5-6.png" />
            
            </figure>
    <div>
      <h2>3. Phishing (Area 1 and Zero Trust)</h2>
      <a href="#3-phishing-area-1-and-zero-trust">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">Phishing</a> remains the primary way to breach organizations. According to <a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>, 90% of cyber attacks begin with it. The FBI has been publishing <a href="https://www.ic3.gov/">Internet Crime Reports</a>, and in the most <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf">recent</a>, phishing continues to be ranked #1 in the top five Internet crime types. Reported phishing crimes and victim losses increased by 1038% since 2018, reaching 300,497 incidents in 2022. The <a href="https://www.ic3.gov/Media/Y2022/PSA220504">FBI</a> also referred to <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise</a> as the $43 billion problem facing organizations, with complaints increasing by 127% in <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf">2022</a>, resulting in $3.31 billion in related losses, compared to 2021.</p><p>In 2022, Cloudflare Area 1 kept 2.3 billion unwanted messages out of customer inboxes. This year, that number will be easily surpassed.</p>
    <div>
      <h3>Introducing Cloudflare's 2023 phishing threats report (<a href="/2023-phishing-report/">✍️</a>)</h3>
      <a href="#introducing-cloudflares-2023-phishing-threats-report">
        
      </a>
    </div>
    <p>In August 2023, Cloudflare published its first <a href="/2023-phishing-report/">phishing threats report</a> — fully available <a href="https://www.cloudflare.com/lp/2023-phishing-report/">here</a>. The report explores key phishing trends and related recommendations, based on email security data from May 2022 to May 2023.</p><p>Some takeaways include how attackers using deceptive links was the #1 phishing tactic — and how they are evolving how they get you to click and when they weaponize the link. Also, identity deception takes multiple forms (including business email compromise (BEC) and brand impersonation), and can easily bypass email authentication standards.</p>
    <div>
      <h3>Cloudflare Area 1 earns SOC 2 report (<a href="/area-1-earns-soc-2-report/">✍️</a>)</h3>
      <a href="#cloudflare-area-1-earns-soc-2-report">
        
      </a>
    </div>
    <p>More than one year ago, Cloudflare <a href="/why-we-are-acquiring-area-1/">acquired</a> Area 1 Security, and with that we added to our <a href="https://www.cloudflare.com/zero-trust-hub/">Cloudflare Zero Trust platform</a> an essential cloud-native <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">email security</a> service that identifies and blocks attacks before they hit user inboxes. This year, we’ve obtained one of the best ways to provide customers assurance that the sensitive information they send to us can be kept safe: a <a href="https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement">SOC 2 Type II report</a>.</p>
    <div>
      <h3>Email Link Isolation: your safety net for the latest phishing attacks (<a href="/area1-eli-ga">✍️</a>)</h3>
      <a href="#email-link-isolation-your-safety-net-for-the-latest-phishing-attacks">
        
      </a>
    </div>
    <p>Back in January, during our <a href="/tag/cio-week/">CIO Week</a>, Email Link Isolation was made generally available to all our customers. What is it? A safety net for the suspicious links that end up in inboxes and that users may click — anyone can click on the wrong link by mistake. This added protection turns <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Cloudflare Area 1</a> into the most comprehensive <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solution</a> when it comes to protecting against malware, <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">phishing attacks</a>, etc. Also, in true Cloudflare fashion, it’s a one-click deployment.</p><p>Additionally, from the same week, Cloudflare combined capabilities from <a href="/dlp-area1-to-protect-data-in-email/">Area 1 Email Security and Data Loss Prevention (DLP)</a> to provide complete data protection for corporate email, and also partnered with <a href="/knowbe4-emailsecurity-integration/">KnowBe4 to equip organizations with real-time security coaching to avoid phishing attacks.</a></p>
    <div>
      <h3>How to stay safe from phishing (<a href="/stay-safe-phishing-attacks/">✍️</a>)</h3>
      <a href="#how-to-stay-safe-from-phishing">
        
      </a>
    </div>
    <p>Phishing attacks come in all sorts of ways to fool people. <a href="/stay-safe-phishing-attacks/">This</a> high level “phish” guide, goes over the different types — while email is definitely the most common, there are others —, and provides some tips to help you catch these scams before you fall for them.</p>
    <div>
      <h3>Top 50 most impersonated brands in phishing attacks and new tools you can use to protect your employees from them (<a href="/50-most-impersonated-brands-protect-phishing/">✍️</a>)</h3>
      <a href="#top-50-most-impersonated-brands-in-phishing-attacks-and-new-tools-you-can-use-to-protect-your-employees-from-them">
        
      </a>
    </div>
    <p><a href="/50-most-impersonated-brands-protect-phishing/">Here</a> we go over arguably one of the hardest challenges any security team is constantly facing, detecting, blocking, and mitigating the risks of phishing attacks. During our <a href="/tag/security-week/">Security Week</a> in March, a Top 50 list of the most impersonated brands in phishing attacks was presented (spoiler alert: AT&amp;T Inc., PayPal, and Microsoft are on the podium).</p><p>Additionally, it was also announced the expansion of the phishing protections available to Cloudflare One customers by automatically identifying — and blocking — so-called “confusable” domains. What is <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>? It’s our suite of products that provides a customizable, and integrated with what a company already uses, Zero Trust <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service</a> platform. It’s built for that already mentioned ease of mind and fearless online use. Cloudflare One, along with the use of physical security keys, was what <a href="/2022-07-sms-phishing-attacks/">thwarted the sophisticated “Oktapus” phishing attack targeting Cloudflare employees</a> last summer.</p><p>On the Zero Trust front, you can also find our recent PDF guide titled “<a href="https://cf-assets.www.cloudflare.com/slt3lc6tev37/4R2Wyj1ERPecMhbycOiPj8/c30f3e8502a04c6626e98072c48d4d7b/Zero_Trust_Roadmap_for_High-Risk_Organizations.pdf">Cloudflare Zero Trust: A roadmap for highrisk organizations”</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lrCgf6J1UTCuibMo1ciaZ/32ee445ad7f038a8372860b1965ecac0/image3-6.png" />
            
            </figure>
    <div>
      <h2>4. AI/Malware/Ransomware &amp; other risks</h2>
      <a href="#4-ai-malware-ransomware-other-risks">
        
      </a>
    </div>
    <p>We have shown in previous years the role of our <a href="/security-center-investigate/">Cloudflare Security Center</a> to investigate threats, and the relevance of different types of risks, such as these two 2022 and 2021 examples: “<a href="/targeted-ransomware-attack/">Anatomy of a Targeted Ransomware Attack</a>” and “<a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">Ransom DDoS attacks target a Fortune Global 500 company</a>”. However, there are new risks in the 2023 horizon.</p>
    <div>
      <h3>How to secure Generative AI applications <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/secure-generative-ai-applications/">✍️</a>)</h3>
      <a href="#how-to-secure-generative-ai-applications">
        
      </a>
    </div>
    <p>Groundbreaking technology brings groundbreaking challenges. Cloudflare has experience protecting some of the largest AI applications in the world, and in this <a href="/secure-generative-ai-applications/">blog post</a> there are some tips and best practices for securing <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/">generative AI</a> applications. Success in consumer-facing applications inherently expose the underlying AI systems to millions of users, vastly increasing the potential <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface</a>.</p>
    <div>
      <h3>Using the power of Cloudflare’s global network to detect malicious domains using machine learning  <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/threat-detection-machine-learning-models/">✍️</a>)</h3>
      <a href="#using-the-power-of-cloudflares-global-network-to-detect-malicious-domains-using-machine-learning">
        
      </a>
    </div>
    <p>Taking into account the objective of <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">preventing threats</a> before they create havoc, <a href="/threat-detection-machine-learning-models/">here</a> we go over that Cloudflare recently developed proprietary models leveraging machine learning and other advanced analytical techniques. These are able to detect security threats that take advantage of the domain name system (<a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>), known as the phonebook of the Internet.</p>
    <div>
      <h3>How sophisticated scammers and phishers are preying on customers of Silicon Valley Bank <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank/">✍️</a>)</h3>
      <a href="#how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank">
        
      </a>
    </div>
    <p>In order to breach trust and trick unsuspecting victims, threat actors overwhelmingly use topical events as lures. The news about what happened at <a href="https://en.wikipedia.org/wiki/Collapse_of_Silicon_Valley_Bank">Silicon Valley Bank</a> earlier this year was one of the latest events to watch out for and stay vigilant against opportunistic phishing campaigns using SVB as the lure. At that time, <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> (Cloudflare’s threat operations and research team) significantly increased our brand monitoring focused on SVB’s digital presence.</p>
    <div>
      <h3>How Cloudflare can help stop malware before it reaches your app <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/waf-content-scanning/">✍️</a>)</h3>
      <a href="#how-cloudflare-can-help-stop-malware-before-it-reaches-your-app">
        
      </a>
    </div>
    <p>In April 2023, Cloudflare <a href="/waf-content-scanning/">launched</a> a tool to make the job of application security teams easier, by providing a content scanning engine integrated with our Web Application Firewall (WAF), so that malicious files being uploaded by end users, never reach origin servers in the first place.</p>
    <div>
      <h3>Analyze any URL safely using the Cloudflare Radar URL Scanner  (<a href="/radar-url-scanner-early-access/">✍️</a>)</h3>
      <a href="#analyze-any-url-safely-using-the-cloudflare-radar-url-scanner">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/">Cloudflare Radar</a> is our free platform for Internet insights. In <a href="/radar-url-scanner-early-access/">March</a>, our <a href="https://radar.cloudflare.com/scan">URL Scanner</a> was launched, allowing anyone to analyze a URL safely. The report that it creates contains a myriad of technical details, including a phishing scan. Many users have been using it for security reasons, but others are just exploring what’s under-the-hood look at any webpage.</p>
    <div>
      <h3>Unmasking the top exploited vulnerabilities of 2022 (<a href="/unmasking-the-top-exploited-vulnerabilities-of-2022/">✍️</a>)</h3>
      <a href="#unmasking-the-top-exploited-vulnerabilities-of-2022">
        
      </a>
    </div>
    <p>Last, but not least, already from August 2023, this <a href="/unmasking-the-top-exploited-vulnerabilities-of-2022/">blog post</a> focuses on the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a">most commonly exploited vulnerabilities</a>, according to the Cybersecurity and Infrastructure Security Agency (CISA). Given Cloudflare’s role as a reverse proxy to a large portion of the Internet, we delve into how the Common Vulnerabilities and Exposures (CVEs) mentioned by CISA are being exploited on the Internet, and a bit of what has been learned.</p><p>If you want to <a href="https://www.cloudflare.com/learning/security/glossary/website-security-checklist/">learn about making a website more secure</a> (and faster) while loading third-party tools like Google Analytics 4, Facebook CAPI, TikTok, and others, you can get to know our <a href="https://developers.cloudflare.com/zaraz/">Cloudflare Zaraz</a> solution. It reached <a href="/cloudflare-zaraz-steps-up-general-availability-and-new-pricing/">general availability in July 2023</a>.</p>
    <div>
      <h2>Wrap up</h2>
      <a href="#wrap-up">
        
      </a>
    </div>
    <blockquote><p><b><i>“The Internet was not built for what it has become”.</i></b></p></blockquote><p>This is how one of <a href="https://www.sec.gov/Archives/edgar/data/1477333/000119312519222176/d735023ds1.htm">Cloudflare’s S-1 document</a> sections begins. It is also commonly <a href="/welcome-to-the-supercloud-and-developer-week-2022/">referenced</a> in our blog to show how this remarkable experiment, the network of networks, wasn’t designed for the role it now plays in our daily lives and work. Security, performance and privacy are crucial in a time when anyone can be the target of an attack, threat, or vulnerability. While AI can aid in mitigating attacks, it also adds complexity to attackers' tactics.</p><p>With that in mind, as we've highlighted in this 2023 reading list suggestions/online attacks guide, prioritizing the prevention of detrimental attack outcomes remains the optimal strategy. Hopefully, it will make some of the attacks on your company go unnoticed or be consequences-free, or even transform them into interesting stories to share when you access your security dashboard.</p><p>If you're interested in exploring specific examples, you can delve into case studies within our <a href="https://www.cloudflare.com/case-studies/">hub</a>, where you’ll find security related stories from different institutions. From a technology company like <a href="https://www.cloudflare.com/case-studies/sage/">Sage</a>, to the <a href="https://www.cloudflare.com/case-studies/state-of-arizona/">State of Arizona</a>, or the <a href="https://www.cloudflare.com/case-studies/republic-of-estonian-information-security-authority/">Republic of Estonia Information Security Authority</a>, and even <a href="https://www.cloudflare.com/case-studies/cybernews/">Cybernews</a>, a cybersecurity news media outlet.</p><p>And because the future of a private and secure Internet is also in our minds, it's worth mentioning that in March 2022, <a href="/post-quantum-for-all/">Cloudflare enabled post-quantum cryptography support</a> for all our customers. The topic of post-quantum cryptography, designed to be secure against the threat of quantum computers, is quite interesting and worth some <a href="/tag/post-quantum/">delving into</a>, but even without knowing what it is, it’s good to know that protection is already here.</p><p>If you want to try some security features mentioned, the <a href="https://www.cloudflare.com/securitycenter/">Cloudflare Security Center</a> is a good place to start (free plans included). The same applies to our <a href="https://www.cloudflare.com/plans/zero-trust-services/">Zero Trust ecosystem</a> (or <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> as our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a>, Secure Access Service Edge) that is available as self-serve, and also includes a free plan. This vendor-agnostic <a href="https://zerotrustroadmap.org/">roadmap</a> shows the general advantages of the Zero Trust architecture, and as we’ve seen, there’s also one focused on <a href="https://cf-assets.www.cloudflare.com/slt3lc6tev37/4R2Wyj1ERPecMhbycOiPj8/c30f3e8502a04c6626e98072c48d4d7b/Zero_Trust_Roadmap_for_High-Risk_Organizations.pdf">high risk organizations</a>.</p><p>Be cautious. Be <a href="https://support.cloudflare.com/hc/en-us/sections/360007347692-Attack-Preparation-and-Response">prepared</a>. Be safe.</p> ]]></content:encoded>
            <category><![CDATA[Reading List]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">4mxh0oGX2mtQSH1OHQ4lpK</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare's 2023 phishing threats report]]></title>
            <link>https://blog.cloudflare.com/2023-phishing-report/</link>
            <pubDate>Wed, 16 Aug 2023 09:13:17 GMT</pubDate>
            <description><![CDATA[ The 2023 Phishing Threats Report analyzes millions of malicious emails, brand impersonation examples, identity deception and other key attack trends based on email security data from a 12-month period ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zKdGorR5BXoIDN9iE1c2y/ef2bc7e7b92d5b73dd48caba515210bb/Introducing-Cloudflare-2023-phishing-threats-report-1.png" />
            
            </figure><p>After shutting down a ‘phishing-as-a-service’ operation that impacted thousands of victims in 43 countries, INTERPOL recently <a href="https://www.interpol.int/en/News-and-Events/News/2023/Notorious-phishing-platform-shut-down-arrests-in-international-police-operation?">noted</a>, “Cyberattacks such as phishing may be borderless and virtual in nature, but their impact on victims is real and devastating.” Business email compromise (<a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">BEC</a>), a type of malware-less attack that tricks recipients into transferring funds — for example — has <a href="https://www.ic3.gov/Media/Y2023/PSA230609">cost</a> victims worldwide more than $50 billion, according to the FBI.</p><p>It is estimated that 90% of successful cyber attacks <a href="https://www.cisa.gov/shields-guidance-families">start</a> with email <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing</a>, which continues to be very lucrative for attackers. There is not much today that can be done to stop phishing <i>attempts</i>. However, to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevent <i>successful</i> attacks</a>, it is important to understand (and proactively address) evolving phishing trends — including the ways attackers cleverly exploit intended victims’ trust in “known” email senders. To that end, this week Cloudflare published its first <a href="https://www.cloudflare.com/lp/2023-phishing-report/">Phishing Threats Report</a>.</p><p>This report explores key phishing trends and related recommendations, based on <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> data from May 2022 to May 2023. During that time, Cloudflare <b>processed approximately 13 billion emails</b>, which included blocking approximately <b>250 million malicious messages</b> from reaching customers’ inboxes. The report is also informed by a Cloudflare-commissioned <b>survey of 316 security decision-makers</b> across North America, EMEA, and APAC (you can download that separate study <a href="https://www.cloudflare.com/lp/zero-trust-to-combat-multichannel-phishing/">here</a>).</p><p>Check out the full report to understand our three key takeaways:</p><ul><li><p><b>Attackers using deceptive links as the #1 phishing tactic</b> — and how they are evolving how they get you to click and when they weaponize the link;</p></li><li><p><b>Identity deception</b> takes multiple forms (including business email compromise (BEC) and brand impersonation), <b>and can easily bypass email authentication standards;</b></p></li><li><p>Attackers pretend to be hundreds of different organizations, but they <b>primarily impersonate the entities we trust</b> and need to get work done.</p></li></ul><p>Here are a few other things to keep in mind as you read the 2023 Phishing Threats report.</p>
    <div>
      <h3>Email threat categorization</h3>
      <a href="#email-threat-categorization">
        
      </a>
    </div>
    <p>Attackers typically use a combination of <a href="https://www.cloudflare.com/learning/security/threats/social-engineering-attack/">social engineering</a> and technical obfuscation techniques to make their messages seem legitimate. Therefore, Cloudflare uses a number of advanced detection techniques to analyze “fuzzy” signals (not just content that’s visible to the naked eye) to identify unwanted emails. Those signals include:</p><ul><li><p><b>Structural analysis</b> of headers, body copy, images, links, attachments, payloads, and more, using heuristics and <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning models</a> specifically designed for phishing signals;</p></li><li><p><b>Sentiment analysis</b> to detect changes in patterns and behaviors (e.g., writing patterns and expressions);</p></li><li><p><b>Trust graphs</b> that evaluate partner social graphs, email sending history, and potential partner impersonations</p></li></ul><p>Our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> also incorporates <a href="https://www.cloudflare.com/learning/security/glossary/threat-intelligence-feed/">threat intelligence</a> from Cloudflare’s global network, which blocks an average of 140 billion cyber threats each day.</p><p>Those and many other signals lead to email dispositions of malicious, BEC, spoof, or spam; our dashboard tells customers the specific reasons (i.e., the threat indicator ‘categories’) for a particular email disposition.</p><p>Below is a snapshot of the top email threat indicators we observed between May 2, 2022, to May 2, 2023. We categorize threat indicators into more than 30 different categories; over that period, the top threat indicators included <b>deceptive links</b>, <b>domain age</b> (newly registered domains), <b>identity deception</b>, <b>credential harvesting</b>, and <b>brand impersonation</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JfZOoAKRayGTRMdjkwQOn/502f97161f6cdd8ba4614e299e5f6fc9/image4-6.png" />
            
            </figure><p>Below are brief descriptions of each of the top categories (detailed in more depth in the report’s appendix).</p><p>If clicked, a <b>deceptive link</b> will open the user’s default web browser and render the data referenced in the link, or open an application directly (e.g. a PDF). Since the display text for a link (i.e., hypertext) in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually malicious.</p><p><b>Domain age</b> is related to domain reputation, which is the overall score assigned to a domain.  For example, domains that send out numerous new emails immediately after domain registration will tend to have a poorer reputation, and thus a lower score.</p><p><b>Identity deception</b> occurs when an attacker or someone with malicious intent sends an email claiming to be someone else. The mechanisms and tactics of this vary widely. Some tactics include registering domains that look similar (aka domain impersonation), are spoofed, or use display name tricks to appear to be sourced from a trusted domain. Other variations include sending email using domain fronting and high-reputation web services platforms.</p><p><b>Credential harvesters</b> are set up by an attacker to deceive users into providing their login credentials. Unwitting users may enter their credentials, ultimately providing attackers with access to their accounts.</p><p><b>Brand impersonation</b> is a form of identity deception where an attacker sends a phishing message that impersonates a recognizable company or brand. Brand impersonation is conducted using a wide range of techniques.</p><p>An <b>attachment</b> to an email that, when opened or executed in the context of an attack, includes a call-to-action (e.g. lures target to click a link) or performs a series of actions set by an attacker.</p><p>Cloudflare regularly observes multiple threat indicators in one phishing email. For example, one Silicon Valley Bank-themed phishing campaign (detailed in <a href="/how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank/">this</a> March 2023 blog) combined <i>brand impersonation</i> with a <i>deceptive link</i> and <i>malicious attachment</i>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uyngezMfEcC6gf784nyV6/225bc53f509017a05329698ccea01c74/image3-5.png" />
            
            </figure><p>The attackers leveraged the SVB brand in a DocuSign-themed template. The email included HTML code that contains an initial link and a complex redirect chain that is four deep. The included HTML file in the attack would have sent the recipient to a WordPress instance that has recursive redirection capability.</p><p>(Speaking of links, deceptive links were the <b>#1 threat category,</b> appearing in <b>35.6% of our detections</b>. And attackers aren’t just using links in email channels; the rise of multi-channel phishing threats — which exploit other applications such as SMS/text, chat, and social media — are also covered in the report).</p>
    <div>
      <h3>Trusted (and most impersonated) brands</h3>
      <a href="#trusted-and-most-impersonated-brands">
        
      </a>
    </div>
    <p>Silicon Valley Bank was just one of <b>approximately 1,000 different brands</b> we observed being impersonated in emails targeting Cloudflare customers between May 2022 and May 2023. (Cloudflare employees were directly targeted via brand impersonation in the “Oktapus” phishing attack that the <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> suite of products <a href="/2022-07-sms-phishing-attacks/">thwarted</a> in July 2022).</p><p>However, as detailed in the Phishing Threats Report, we observed that email attackers most often (51.7% of the time) impersonated one of 20 well-known global brands, with <b>Microsoft</b> being #1 on their list.</p>
<table>
<thead>
  <tr>
    <th><span>Rank</span></th>
    <th><span>Impersonated brand</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>1</span></td>
    <td><span>Microsoft</span></td>
  </tr>
  <tr>
    <td><span>2</span></td>
    <td><span>World Health Organization</span></td>
  </tr>
  <tr>
    <td><span>3</span></td>
    <td><span>Google</span></td>
  </tr>
  <tr>
    <td><span>4</span></td>
    <td><span>SpaceX</span></td>
  </tr>
  <tr>
    <td><span>5</span></td>
    <td><span>Salesforce</span></td>
  </tr>
  <tr>
    <td><span>6</span></td>
    <td><span>Apple</span></td>
  </tr>
  <tr>
    <td><span>7</span></td>
    <td><span>Amazon</span></td>
  </tr>
  <tr>
    <td><span>8</span></td>
    <td><span>T-Mobile</span></td>
  </tr>
  <tr>
    <td><span>9</span></td>
    <td><span>YouTube</span></td>
  </tr>
  <tr>
    <td><span>10</span></td>
    <td><span>MasterCard</span></td>
  </tr>
  <tr>
    <td><span>11</span></td>
    <td><span>Notion.so</span></td>
  </tr>
  <tr>
    <td><span>12</span></td>
    <td><span>Comcast</span></td>
  </tr>
  <tr>
    <td><span>13</span></td>
    <td><span>Line Pay</span></td>
  </tr>
  <tr>
    <td><span>14</span></td>
    <td><span>MasterClass</span></td>
  </tr>
  <tr>
    <td><span>15</span></td>
    <td><span>Box</span></td>
  </tr>
  <tr>
    <td><span>16</span></td>
    <td><span>Truist Financial Corp</span></td>
  </tr>
  <tr>
    <td><span>17</span></td>
    <td><span>Facebook</span></td>
  </tr>
  <tr>
    <td><span>18</span></td>
    <td><span>Instagram</span></td>
  </tr>
  <tr>
    <td><span>19</span></td>
    <td><span>AT&amp;T</span></td>
  </tr>
  <tr>
    <td><span>20</span></td>
    <td><span>Louis Vuitton</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Example of a Microsoft credential harvesting attempt</h3>
      <a href="#example-of-a-microsoft-credential-harvesting-attempt">
        
      </a>
    </div>
    <p>Earlier this year, Cloudflare detected and blocked a phishing campaign leveraging the Microsoft brand in an attempt to harvest credentials through a legitimate — but compromised — site.</p><p>In the email example below, there is no text in the body of the email despite its appearance. The entire body is a hyperlinked JPEG image. Thus, if the recipient clicks anywhere in the body (even if they don’t intend to click the link), they are effectively clicking the link.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7awKbnZvPkxboytqFmUaGl/7506202a224e5b3ee8736074d7d7e7d0/image1-16.png" />
            
            </figure><p>Initially, the hyperlink for this image appears to be a benign Baidu URL - hxxp://www.baidu[.]com/link?url=-yee3T9X9U41UHUa3VV6lx1j5eX2EoI6XpZqfDgDcf-2NYQ8RVpOn5OYkDTuk8Wg#&lt;recipient’s email address base64 encoded&gt;.  However, if this link is clicked, the target’s browser would be redirected to a site that had been compromised and used to host a credential harvester.</p><p>The attacker used Microsoft Office 365 branding, but attempted to circumvent any brand detection techniques by including the brand information within the image (i.e., there was no plaintext or HTML text that could be inspected to identify the brand).</p><p>However, using optical character recognition (OCR), Cloudflare successfully identified “Office 365” and “Microsoft” in the image. Using OCR, we also identified the use of suspicious account lures related to passwords.</p><p>In this example, attackers’ techniques included:</p><ul><li><p>Inclusion of only a JPEG image (impossible to detect words without OCR)</p></li><li><p>Embedding a hyperlink in that image (clicking anywhere in the body would result in clicking the link)</p></li><li><p>Hyperlinking to a Baidu URL (used to bypass reputation-based URL detection techniques)</p></li><li><p>The Baidu URL redirecting the recipient’s browser to a credential harvesting site (i.e., would circumvent other email security defenses that are not capable of deep link inspection)</p></li><li><p>Hosting the credential harvester on a legitimate site that had been compromised by the attacker (even with deep link inspection, will again attempt to bypass URL detection techniques based on reputation)</p></li></ul><p>This attack vector leverages the high reputation and authenticity of Baidu to bypass the reputation of the true host/IP where the credential harvester is hosted.</p><p>While this specific campaign focused on harvesting Microsoft credentials, we often see attackers using similar methods to bypass brand detection techniques and trick victims into downloading <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> and other <a href="https://www.cloudflare.com/learning/security/glossary/malicious-payload/">malicious payloads</a>.</p><p>URL redirection techniques are often seen in phishing campaigns, but threat actors are continuing to refine their approach by abusing more and more legitimate domains like <a href="http://baidu.com">baidu.com</a>, <a href="http://bing.com">bing.com</a>, <a href="http://goo.gl">goo.gl</a>, etc. Our numerous detection capabilities allow us to conduct deep link inspection of URLs using redirection techniques of all kinds, including those that abuse legitimate domains.</p>
    <div>
      <h3>What about SPF, DKIM, and DMARC?</h3>
      <a href="#what-about-spf-dkim-and-dmarc">
        
      </a>
    </div>
    <p>Email authentication (specifically the <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">SPF, DKIM, and DMARC</a> standards) are often mentioned as useful against brand impersonation: these standards help validate server and tenant origins, protect message integrity, provide policy enforcement, and more.</p><p>However, attackers can still find ways to bypass authentication to trick email suites; and we actually observed that <b>89% of unwanted messages “passed”</b> SPF, DKIM, and/or DMARC checks.</p><p>Some limitations of email authentication include:</p>
<table>
<thead>
  <tr>
    <th><span>SPF  </span><br /><span>(Sender Policy Framework)</span></th>
    <th><span>Key benefits:</span><br /><span>Validating server origin (i.e., validates where a message originates from)</span><br /><span>Defining which email servers and services are allowed to send messages on a domain owner’s behalf</span></th>
  </tr>
  <tr>
    <th><span>Limitations:</span><br /><span>Does not prevent lookalike email, domain, or display name </span><a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/"><span>spoofing</span></a><br /><span>Does not validate the “From” header; uses envelope “From” to determine sending domain</span><br /><span>Validation ineffective when emails are forwarded or when messages sent to a mailing list are sent to each subscriber </span><br /><span>SPF evaluation process can be limited to a certain number of </span><a href="https://www.cloudflare.com/learning/dns/what-is-dns/"><span>DNS</span></a><span> lookups</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, </span><a href="https://www.cloudflare.com/learning/security/glossary/malicious-payload/"><span>malicious payloads</span></a><span>, or attachments</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>DKIM </span><br /><span>(Domain Keys Identified Mail)</span></td>
    <td><span>Key benefits:</span><br /><span>Providing tenant origin validation (i.e., checks that an email was sent/authorized by the owner of the domain via a digital signature)</span><br /><span>Ensuring email is not altered while transferred from server to server; protecting message integrity</span></td>
  </tr>
  <tr>
    <td><span>Limitations:</span><br /><span>Does not prevent lookalike email, domain, or display name spoofing</span><br /><span>Does not protect against </span><a href="https://developers.cloudflare.com/magic-wan/reference/anti-replay-protection/"><span>replay attacks</span></a><span> (DKIM only signs specific parts of a message. Attackers can add other header fields to emails passing DKIM then forward them.)</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</span></td>
  </tr>
  <tr>
    <td><span>DMARC (Domain-based Message Authentication, Reporting and Conformance)</span></td>
    <td><span>Key benefits:</span><br /><span>Providing policy enforcement and reporting for SPF and DKIM</span><br /><span>Stipulating what policy to follow if an email doesn’t pass SPF or DKIM authentication (e.g. reject/delete, quarantine, no policy/send)</span><br /><span>Reporting function allows domain owners to see who is sending email on their behalf (i.e., protecting against spoofing of your own domain and brand abuse)</span></td>
  </tr>
  <tr>
    <td><span>Limitations: </span><br /><span>Does not prevent spoofing of another brand’s domain</span><br /><span>Does not prevent lookalike email, domain, or display name spoofing</span><br /><span>Domain owners specify what percentage of mail DMARC policies it applies to; application percentages of less than 100% are less effective</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Conclusions</h3>
      <a href="#conclusions">
        
      </a>
    </div>
    <p>Attackers are constantly evolving their tactics. Multiple protection layers must be enacted before, during, and after messages reach the inbox. Cloudflare never inherently “trusts” any type of email communication (whether it appears to be internal, external, or from a ‘known’ business partner).</p><p>Likewise, we recommend that — first and foremost — all organizations extend the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security model</a> of “never trust, always verify” not just to the network and applications, but also to the email inbox.</p><p>In addition to <a href="https://www.cloudflare.com/zero-trust/products/email-security/">securing email</a> with a Zero Trust approach, we also recommend:</p><ul><li><p><b>Augmenting cloud email with multiple anti-phishing controls.</b> As noted in <a href="https://www.forrester.com/blogs/announcing-the-forrester-wave-enterprise-email-security-q2-2023/">this</a> Forrester blog from June, <i>“The use of messaging, collaboration, file sharing, and enterprise software-as-a-service applications across multiple devices all contribute to employee productivity and experience. Many of these environments are considered ‘closed,’ but one successful phish of a supply chain partner’s credentials opens your organization up to data loss, credential theft, fraud, and ransomware attacks. Protections developed for the email inbox must extend to these environments and throughout the day-to-day workflows of your employees.”</i></p></li><li><p><b>Adopting phishing-resistant multifactor authentication (</b><a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><b>MFA</b></a><b>).</b> While not all MFA provides the same layer of security, hardware security keys are among the most secure authentication methods for <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">preventing successful phishing attacks</a>. They can protect networks even if attackers gain access to usernames and passwords.</p></li><li><p><b>Make it harder for humans to make mistakes.</b>  Meet employees and teams where they are by making the tools they already use more secure, and preventing them from making mistakes. For example, remote browser isolation (<a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">RBI</a>) technology, when integrated with <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a>, can automatically isolate suspicious email links to prevent users from being exposed to potentially malicious web content. Keyboard inputs can also be disabled on untrusted websites, protecting users from accidentally entering sensitive information within a form fill or credential harvesting. This provides a layer of defense against multi-channel phishing attacks by effectively allowing users to safely open links without disrupting their workflow.</p></li></ul><p>If you’re interested in the full findings, you can download the 2023 Phishing Threats Report <a href="https://www.cloudflare.com/lp/2023-phishing-report/">here</a>, as well as our recommendations for preventing successful phishing attacks. And if you’d like to see Cloudflare’s email security in action, you can request a free phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">5r8tVebXSz3ESgfdLHjC7X</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
            <dc:creator>Juliette Cash</dc:creator>
        </item>
        <item>
            <title><![CDATA[Analyze any URL safely using the Cloudflare Radar URL Scanner]]></title>
            <link>https://blog.cloudflare.com/radar-url-scanner-early-access/</link>
            <pubDate>Wed, 15 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Try our URL Scanner. Cloudflare Radar’s newest free tool for an under-the-hood look at any webpage ]]></description>
            <content:encoded><![CDATA[ <p></p><p>One of the first steps in an <a href="https://www.cloudflare.com/learning/security/what-is-information-security/">information security</a> investigation is to gather as much context as possible. But compiling that information can become a sprawling task.</p><p>Cloudflare is excited to announce early access to a new, free tool — the <a href="http://radar.cloudflare.com/scan">Radar URL Scanner</a>. Provide us a URL, and our scanner will compile a report containing a myriad of technical details: a phishing scan, <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL certificate</a> data, HTTP request and response data, page performance data, DNS records, whether cookies are set to secure and HttpOnly, what technologies and libraries the page uses, and more.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1GsgfSITBhXstKRgSfvypB/8d561e767aa13862b4644783153c2704/pasted-image-0-8.png" />
            
            </figure><p>Let’s walk through a report on John Graham-Cumming’s blog as an example. Conveniently, all reports generated will be publicly accessible.</p><p>The first page is the summary tab, and you’ll see we’ve broken all the available data into the following categories: Security, Cookies, Network, Technology, DOM, and Performance. It’s a lot of content so we will jump through some highlights.</p><p>In the Summary tab itself, you’ll notice the submitted URL was <code>https://blog.jgc.org</code>. If we had received a URL short link, the scanner would have followed the redirects and generated a report for the final URL.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/34kwoSuWi6QoxI7jIMVVBC/44a65ac5e58230eccee490f4eb6598ce/pasted-image-0--1--4.png" />
            
            </figure><p>The Security tab presents information to help determine whether a page is safe to visit with a phishing and certificates section. In our blog example, the report confirms the link we provided is not a phishing link, but there could easily be phishing scams trying to harvest personal information. We’re excited to enable wider access to our <a href="https://www.cloudflare.com/securitycenter/">security infrastructure</a> with this free tool.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Kez8ydCdqqjKk2It8mixK/6524d0216969cd6c90506cd834f0fa3f/pasted-image-0--2--2.png" />
            
            </figure><p>The Cookies tab can indicate how privacy friendly a website is to its users. We show all the cookies set and their attribute values to do this. In this report, the blog loaded 2 cookies. There's the Secure flag. You’ll want that set to true as often as possible because this means the cookie may only be transmitted over HTTPS, preventing it from being observed by unauthorized parties. Additionally, cookies set to HttpOnly will be inaccessible to the JavaScript API, potentially <a href="https://www.cloudflare.com/learning/security/how-to-prevent-xss-attacks/">mitigating XSS attacks</a> from third-party scripts.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/01ObBbNRbauQICeLQCKiIm/3e75b28b2cf4a49683714bc8d266f638/pasted-image-0--3--2.png" />
            
            </figure><p>The Technology tab enumerates the technologies, frameworks, libraries, etc that are used to power the page being scanned. Understanding the technology stack of a page can be very useful for when there are outages in a particular service, when exploits in popular libraries are discovered, or simply to understand what tools are most popular in the industry. John’s blog appears to use 7 different technologies including Google AdSense, Blogger, and Cloudflare.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Kp2mqp5PbBnSDNMayeMF5/a9f246ff54b8790f0985ac25a23d8605/pasted-image-0--4--2.png" />
            
            </figure><p>The Network tab shows all the HTTP transactions that occur on the page as well as the hostname’s associated DNS records. HTTP transactions are the requests and responses the page makes to load all its content. This tells engineers where the website is going to load its content. Our report of John’s blog shows a total of 82 requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3v3qvBLBtxtpJZd3MveiLr/b3473b358c8bc4c74d51685f01b228af/pasted-image-0--5--1.png" />
            
            </figure><p>The tab also contains DNS records which are a great way to understand more about the fundamentals of the page. And of course, we at Cloudflare are big advocates for enabling <a href="https://www.cloudflare.com/dns/dnssec/how-dnssec-works/">DNSSEC</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4xzzSHEkXPIAsuidVqzIlE/9dae3d756d1c6fcfeb4f3ad0f3b8566a/pasted-image-0--6--1.png" />
            
            </figure><p>The DOM (Document Object Model) tab conveniently collates common information you may be looking for from within the page. We grouped together lists of all hyperlinks and global JavaScript variables. Additionally, we provide the raw HTML of the page for you to further analyze. Our report shows the blog’s landing page has 104 hyperlinks going off to other websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3iv4M2V1zvhEnmdRxnH2pU/e5cb14ca8c13365ff36497b31fecbe8f/pasted-image-0--7--3.png" />
            
            </figure><p>The Performance tab presents a breakdown of the time it takes for the website to load. It’s not enough for a page to be secure for users. It must also be usable, and load speeds are a big factor in the overall experience. That’s why we’ve also included <a href="https://developer.mozilla.org/en-US/docs/Web/API/PerformanceNavigationTiming">Performance Navigation Timing</a> metrics alongside our more security and privacy oriented tabs.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FZbcHW8RHpnz51yD59Itc/21600bdf993f1514cf74ae5ca0e9d7c8/pasted-image-0--8--1.png" />
            
            </figure><p>Under the hood, one of the great things about this tool is that the underlying scanning technology uses Cloudflare’s homegrown <a href="/introducing-workers-browser-rendering-api/">Workers Browser Rendering API</a> to run all our headless scans. You can follow that link to join the waitlist and try it out for yourself.</p><p>In the future, we envision adding features to our scanner to complement the ones from this launch: <a href="https://developers.cloudflare.com/radar/">API endpoints</a> so you don’t need to rely on a GUI, private scans for more sensitive or recurring reports, and also security recommendations with integrations with the <a href="https://www.cloudflare.com/securitycenter/">Cloudflare Security Center</a>. And since this is a Radar product, not only can users expect the data generated to further enhance our security threat modeling, they can also look forward to us providing back insights and visualizations from the aggregate trends we observe.</p><p>The Radar URL Scanner tool’s journey to helping make the Internet more transparent and secure has only just begun, but we’re excited for you all to try it out <a href="http://radar.cloudflare.com/scan">here</a>. If you have any questions or would like to discuss enterprise level features on your wishlist, feel free to reach out via Twitter at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> or email us at <a>radar@cloudflare.com</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">3IeePXdKw8F2GQCVeLjNot</guid>
            <dc:creator>Stanley Chiang</dc:creator>
        </item>
        <item>
            <title><![CDATA[How sophisticated scammers and phishers are preying on customers of Silicon Valley Bank]]></title>
            <link>https://blog.cloudflare.com/how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank/</link>
            <pubDate>Tue, 14 Mar 2023 23:11:35 GMT</pubDate>
            <description><![CDATA[ In order to breach trust and trick unsuspecting victims, threat actors overwhelmingly use topical events as lures. The news about what happened at Silicon Valley Bank is the latest event to watch out for and stay vigilant against opportunistic phishing campaigns using SVB as the lure ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2K9Pq73I7we9IQNaqEV9Yk/dae023389b8cbdc00e8202d96378098c/SVB---Banking-Phishing.png" />
            
            </figure><p>By now, the news about what happened at Silicon Valley Bank (SVB) leading up to its <a href="https://www.cnn.com/2023/03/11/business/svb-collapse-roundup-takeaways/index.html">collapse</a> and takeover by the US Federal Government is well known. The rapid speed with which the collapse took place was surprising to many and the impact on organizations, both large and small, is expected to last a while.</p><p>Unfortunately, where everyone sees a tragic situation, threat actors see opportunity. We have seen this time and again - in order to breach trust and trick unsuspecting victims, threat actors overwhelmingly use topical events as lures. These follow the news cycle or known high profile events (The Super Bowl, March Madness, Tax Day, Black Friday sales, COVID-19, and on and on), since there is a greater likelihood of users falling for messages referencing what’s top of mind at any given moment.</p><p>The SVB news cycle makes for a similarly compelling topical event that threat actors can take advantage of; and it's crucial that organizations bolster their awareness campaigns and technical controls to help counter the eventual use of these tactics in upcoming attacks. It’s tragic that even as the FDIC is guaranteeing that SVB customers’ money is safe, bad actors are attempting to steal that very money!</p>
    <div>
      <h3>Preemptive action</h3>
      <a href="#preemptive-action">
        
      </a>
    </div>
    <p>In anticipation of future phishing attacks taking advantage of the SVB brand, <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> (Cloudflare’s threat operations and research team) significantly increased our brand monitoring focused on SVB’s digital presence starting March 10, 2023 and launched several additional detection modules to spot SVB-themed phishing campaigns. All of our customers taking advantage of our various <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">phishing protection services</a> automatically get the benefit of these new models.</p><p>Here’s an actual example of a real campaign involving SVB that’s happening since the bank was taken over by the FDIC.</p>
    <div>
      <h3>KYC phish - DocuSign-themed SVB campaign</h3>
      <a href="#kyc-phish-docusign-themed-svb-campaign">
        
      </a>
    </div>
    <p>A frequent tactic used by threat actors is to mimic ongoing KYC (Know Your Customer) efforts that banks routinely perform to validate details about their clients. This is intended to protect financial institutions against fraud, money laundering and financial crime, amongst other things.</p><p>On March 14, 2023, Cloudflare detected a large KYC phishing campaign leveraging the SVB brand in a DocuSign themed template. This campaign targeted Cloudflare and almost all industry verticals. Within the first few hours of the campaign, we detected 79 examples targeting different individuals in multiple organizations. Cloudflare is publishing one specific example of this campaign along with the tactics and observables seen to help customers be aware and vigilant of this activity.</p>
    <div>
      <h3>Campaign Details</h3>
      <a href="#campaign-details">
        
      </a>
    </div>
    <p>The phishing attack shown below targeted Matthew Prince, Founder &amp; CEO of Cloudflare on March 14, 2023. It included HTML code that contains an initial link and a complex redirect chain that is four-deep. The chain begins when the user clicks the ‘<i>Review Documents’</i> link. It takes the user to a trackable analytic link run by Sizmek by Amazon Advertising Server bs[.]serving-sys[.]com. The link then further redirects the user to a Google Firebase Application hosted on the domain na2signing[.]web[.]app. The na2signing[.]web[.]app HTML subsequently redirects the user to a WordPress site which is running yet another redirector at eaglelodgealaska[.]com. After this final redirect, the user is sent to an attacker-controlled docusigning[.]kirklandellis[.]net website.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CUrJjdOU6E91EhkVvJ97S/2539df0907ea0b9f546b5b4507ec99f7/Screenshot-2023-03-14-at-10.11.01.png" />
            
            </figure><p>Campaign Timeline</p>
            <pre><code>2023-03-14T12:05:28Z		First Observed SVB DocuSign Campaign Launched
2023-03-14T15:25:26Z		Last Observed SVB DocuSign Campaign Launched</code></pre>
            
    <div>
      <h3>A look at the HTML file Google Firebase application (na2signing[.]web[.]app)</h3>
      <a href="#a-look-at-the-html-file-google-firebase-application-na2signing-web-app">
        
      </a>
    </div>
    <p>The included HTML file in the attack sends the user to a WordPress instance that has recursive redirection capability. As of this writing, we are not sure if this specific WordPress installation has been compromised or a plugin was installed to open this redirect location.</p>
            <pre><code>&lt;html dir="ltr" class="" lang="en"&gt;&lt;head&gt;
    &lt;title&gt;Sign in to your account&lt;/title&gt;
    
    &lt;script type="text/javascript"&gt;
    window.onload = function() {
        function Redirect (url){
            window.location.href = url;
        }
        var urlParams = new URLSearchParams(window.location.href);
        var e = window.location.href;
        
       
        Redirect("https://eaglelodgealaska[.]com/wp-header.php?url="+e);
    }
&lt;/script&gt;
</code></pre>
            
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    
            <pre><code>na2signing[.]web[.]app	Malicious Google Cloudbase Application.
eaglelodgealaska[.]com	Possibly compromised Wordpress website or an open redirect.

*[.]kirklandellis[.]net		Attacker Controlled Application running on at least docusigning[.]kirklandellis[.]net.</code></pre>
            
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <ol><li><p>Cloudflare Email Security customers can determine if they have received this campaign in their dashboard with the following search terms:</p><p><code>SH_6a73a08e46058f0ff78784f63927446d875e7e045ef46a3cb7fc00eb8840f6f0</code></p><p>Customers can also track IOCs related to this campaign through our Threat Indicators API. Any updated IOCs will be continually pushed to the relevant API endpoints.</p></li><li><p>Ensure that you have appropriate DMARC policy enforcement for inbound messages. Cloudflare recommends <b>[p = quarantine]</b> for any DMARC failures on incoming messages at a minimum. SVB’s DMARC records [<code>v=DMARC1; p=reject; pct=100</code>] explicitly state rejecting any messages that impersonate their brand and are not being sent from SVB’s list of designated and verified senders. Cloudflare Email Security customers will automatically get this enforcement based on SVB’s published DMARC records. For other domains, or to apply broader DMARC based policies on all inbound messages, Cloudflare recommends adhering to ‘Enhanced Sender Verification’ policies across all inbound emails within their <a href="https://developers.cloudflare.com/email-security/email-configuration/email-policies/">Cloudflare Area 1 dashboard</a>.</p></li><li><p>Cloudflare Gateway customers are automatically protected against these malicious URLs and domains. Customers can check their logs for these specific IOCs to determine if their organization had any traffic to these sites.</p></li><li><p>Work with your phishing awareness and training providers to deploy SVB-themed phishing simulations for your end users, if they haven’t done so already.</p></li><li><p>Encourage your end users to be vigilant about any ACH (Automated Clearing House) or SWIFT (Society for Worldwide Interbank Financial Telecommunication) related messages. ACH &amp; SWIFT are systems which financial institutions use for electronic funds transfers between entities. Given its large scale prevalence, ACH &amp; SWIFT phish are frequent tactics leveraged by threat actors to redirect payments to themselves. While we haven’t seen any large scale ACH campaigns utilizing the SVB brand over the past few days, it doesn’t mean they are not being planned or are imminent. Here are a few example subject lines to be aware of, that we have seen in similar payment fraud campaigns:</p><p><i>“We’ve changed our bank details”“Updated Bank Account Information”“YOUR URGENT ACTION IS NEEDED -Important - Bank account details change”“Important - Bank account details change”“Financial Institution Change Notice”</i></p></li><li><p>Stay vigilant against look-alike or cousin domains that could pop up in your email and web traffic associated with SVB. Cloudflare customers have in-built new domain controls within their email &amp; web traffic which would prevent <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">anomalous activity</a> coming from these new domains from getting through.</p></li><li><p>Ensure any public facing web applications are always patched to the latest versions and run a modern Web Application Firewall service in front of your applications. The campaign mentioned above took advantage of WordPress, which is frequently used by threat actors for their phishing sites. If you’re using the Cloudflare WAF, you can be automatically protected from third party CVEs before you even know about them. Having an effective <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> is critical to preventing threat actors from taking over your public Web presence and using it as part of a phishing campaign, SVB-themed or otherwise.</p></li></ol>
    <div>
      <h3>Staying ahead</h3>
      <a href="#staying-ahead">
        
      </a>
    </div>
    <p>Cloudforce One (Cloudflare’s threat operations team) proactively monitors emerging campaigns in their formative stages and publishes advisories and detection model updates to ensure our customers are protected. While this specific campaign is focused on SVB, the tactics seen are no different to other similar campaigns that our global network sees every day and automatically stops them before it impacts our customers.</p><p>Having a blend of strong technical controls across multiple communication channels along with a trained and vigilant workforce that is aware of the dangers posed by digital communications is crucial to stopping these attacks from going through.</p><p>Learn more about how Cloudflare can help in your own journey towards comprehensive phishing protection by using our <a href="https://www.cloudflare.com/zero-trust-hub/">Zero Trust services</a> and reach out for a <a href="https://www.cloudflare.com/lp/emailsecurity/">complimentary assessment today</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">7b0pR9io6vgFmhNY2MJybq</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Blake Darché</dc:creator>
        </item>
        <item>
            <title><![CDATA[Top 50 most impersonated brands in phishing attacks and new tools you can use to protect your employees from them]]></title>
            <link>https://blog.cloudflare.com/50-most-impersonated-brands-protect-phishing/</link>
            <pubDate>Mon, 13 Mar 2023 13:05:00 GMT</pubDate>
            <description><![CDATA[ We’re expanding the phishing protections available to Cloudflare One customers by automatically identifying—and blocking—so-called “confusable” domains. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2HFWBu7dmLiLxn5ZJIyZSh/07c104656900ba4f17f5129e471f9036/image4-7.png" />
            
            </figure><p>Someone in your organization may have just submitted an administrator username and password for an internal system to the wrong website. And just like that, an attacker is now able to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate sensitive data</a>.</p><p>How did it all happen? A well crafted email.</p><p>Detecting, blocking, and mitigating the risks of phishing attacks is arguably one of the hardest challenges any security team is constantly facing.</p><p>Starting today, we are opening beta access to our new brand and <a href="https://www.cloudflare.com/zero-trust/products/email-security/">anti-phishing tools</a> directly from our Security Center dashboard, allowing you to catch and mitigate phishing campaigns targeting your organization even before they happen.</p>
    <div>
      <h2>The challenge of phishing attacks</h2>
      <a href="#the-challenge-of-phishing-attacks">
        
      </a>
    </div>
    <p>Perhaps the most publicized threat vector over the past several months has been phishing attacks. These attacks are highly sophisticated, difficult to detect, becoming more frequent, and can have devastating consequences for businesses that fall victim to them.</p><p>One of the biggest challenges in <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">preventing phishing attacks</a> is the sheer volume and the difficulty of distinguishing legitimate emails and websites from <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">fraudulent ones</a>. Even when users are vigilant, it can be hard to spot the subtle differences that attackers use to make their phishing emails and websites look convincing.</p><p>For example, last July our Cloudflare One suite of products and use of physical security keys <a href="/2022-07-sms-phishing-attacks/">thwarted the sophisticated “Oktapus” phishing attack targeting Cloudflare employees</a>. The attacker behind the “Oktapus” attack that successfully compromised <a href="https://www.theregister.com/2022/08/25/twilio_cloudflare_oktapus_phishing/">more than one hundred companies</a>, registered the “cloudflare-okta.com” domain name just 40 minutes before sending it to our employees.</p><p>At that time, we identified phishing domains with our <a href="https://www.cloudflare.com/products/registrar/custom-domain-protection/">secure registrar product</a>—but there was a delay in receiving the list of newly registered domains for monitoring purposes. Today, by streaming newly observed domains resolved by our <a href="/announcing-1111/">1.1.1.1 resolver</a> (and other resolvers), we are able to detect phishing domains almost immediately. This gives us the upper hand and allows us to block phishing attempts before they happen.</p><p>We want to start giving our customers access to the same tools we use internally, to help you fight the ongoing challenge.</p>
    <div>
      <h2>New Brand and Phishing Protection tools in Cloudflare’s Security Center</h2>
      <a href="#new-brand-and-phishing-protection-tools-in-cloudflares-security-center">
        
      </a>
    </div>
    <p>We’re expanding the phishing protections available to Cloudflare One customers by automatically identifying—and blocking—so-called “confusable” domains. Common misspellings (clodflare.com) and concatenation of services (cloudflare-okta.com) are often registered by attackers to trick unsuspecting victims into submitting private information such as passwords, and these new tools provide an additional layer of protection against such attempts.</p><p>The new Brand and Phishing Protection tools can be found under the Cloudflare Security Center, and provide even more controls (e.g. custom strings to monitor, searchable list of historical domains, etc.) to our customers. Cloudflare One plans can have access, with the level of control, visibility, and automation based on their plan type.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RUb5B1d6XkTWAn9YZ44cM/62d112527749f64f1262cb30445269f6/image3-6.png" />
            
            </figure>
    <div>
      <h3>New domain brand matching and alerting</h3>
      <a href="#new-domain-brand-matching-and-alerting">
        
      </a>
    </div>
    <p>At the heart of our new brand protection feature is our ability to detect hostnames created specifically for phishing legitimate brands. We start by monitoring the first use of a domain or subdomain by sifting through trillions of daily DNS queries made to 1.1.1.1, Cloudflare’s public DNS resolver, in order to compile a list of hostnames in the wild for the first time.</p><p>Using this list, we perform <a href="https://en.wikipedia.org/wiki/Fuzzy_matching_(computer-assisted_translation)">”fuzzy” matching</a>, a technique used to match two strings that are similar in meaning or spelling, against our users' saved patterns in real-time. We compare the strings and calculate a similarity score based on various factors (ie: phonetics, distance, substring matching). These saved patterns, which can be strings with <a href="https://en.wikipedia.org/wiki/Edit_distance">edit distances</a>, enable our system to generate alerts whenever we detect a match with any of the domains in the list.</p><p>While our users currently have to create and save these queries, we will introduce an automated matching system in the future. This system will simplify the process of detecting matches for our users,  though custom strings will still be available for security teams tracking more complex patterns.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5OjKjvKBJv4kicRl12MQFF/25aff5f3a7d3dbce8652b81f043cde44/image2-6.png" />
            
            </figure>
    <div>
      <h3>Historical searches</h3>
      <a href="#historical-searches">
        
      </a>
    </div>
    <p>In addition to real-time monitoring, we offer historical searches (saved queries) and alerts for newly observed domains within the last 30 days. When a new pattern is created, we will display search results from the last 30 days to show any potential matches. This allows security teams to quickly assess the potential threat level of a new domain and take necessary actions.</p><p>Furthermore, this search mechanism can also be used for ad hoc domain hunting, providing additional flexibility for security teams who may need to investigate specific domains or patterns.</p>
    <div>
      <h2>Observations in the wild: most phished brands</h2>
      <a href="#observations-in-the-wild-most-phished-brands">
        
      </a>
    </div>
    <p>While building out these new Brand Protection tools, we wanted to test our capabilities against a broad set of commonly phished brands. To do so, we  examined the frequency that domains containing phishing URLs were resolved against our 1.1.1.1 resolver. All domains that are used for shared services (like hosting sites Google, Amazon, GoDaddy) that could not be verified as a phishing attempt were removed from the data set.</p><p>The top 50 brands we found, along with one of the most commonly used domains for phishing those brands can be found in the table below.</p>
<table>
<thead>
  <tr>
    <th><span>Rank</span></th>
    <th><span>Brand</span></th>
    <th><span>Sample domain used to phish brand[1]</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>1</span></td>
    <td><span>AT&amp;T Inc.</span></td>
    <td><span>att-rsshelp[.]com</span></td>
  </tr>
  <tr>
    <td><span>2</span></td>
    <td><span>PayPal</span></td>
    <td><span>paypal-opladen[.]be</span></td>
  </tr>
  <tr>
    <td><span>3</span></td>
    <td><span>Microsoft</span></td>
    <td><span>login[.]microsoftonline.ccisystems[.]us</span></td>
  </tr>
  <tr>
    <td><span>4</span></td>
    <td><span>DHL</span></td>
    <td><span>dhlinfos[.]link</span></td>
  </tr>
  <tr>
    <td><span>5</span></td>
    <td><span>Meta</span></td>
    <td><span>facebookztv[.]com</span></td>
  </tr>
  <tr>
    <td><span>6</span></td>
    <td><span>Internal Revenue Service</span></td>
    <td><span>irs-contact-payments[.]com</span></td>
  </tr>
  <tr>
    <td><span>7</span></td>
    <td><span>Verizon</span></td>
    <td><span>loginnnaolcccom[.]weebly[.]com</span></td>
  </tr>
  <tr>
    <td><span>8</span></td>
    <td><span>Mitsubishi UFJ NICOS Co., Ltd.</span></td>
    <td><span>cufjaj[.]id</span></td>
  </tr>
  <tr>
    <td><span>9</span></td>
    <td><span>Adobe</span></td>
    <td><span>adobe-pdf-sick-alley[.]surge[.]sh</span></td>
  </tr>
  <tr>
    <td><span>10</span></td>
    <td><span>Amazon</span></td>
    <td><span>login-amazon-account[.]com</span></td>
  </tr>
  <tr>
    <td><span>11</span></td>
    <td><span>Apple</span></td>
    <td><span>apple-grx-support-online[.]com</span></td>
  </tr>
  <tr>
    <td><span>12</span></td>
    <td><span>Wells Fargo &amp; Company</span></td>
    <td><span>connect-secure-wellsfargo-com.herokuapp[.]com</span></td>
  </tr>
  <tr>
    <td><span>13</span></td>
    <td><span>eBay, Inc.</span></td>
    <td><span>www[.]ebay8[.]bar</span></td>
  </tr>
  <tr>
    <td><span>14</span></td>
    <td><span>Swiss Post</span></td>
    <td><span>www[.]swiss-post-ch[.]com</span></td>
  </tr>
  <tr>
    <td><span>15</span></td>
    <td><span>Naver</span></td>
    <td><span>uzzmuqwv[.]naveicoipa[.]tech</span></td>
  </tr>
  <tr>
    <td><span>16</span></td>
    <td><span>Instagram (Meta)</span></td>
    <td><span>instagram-com-p[.]proxy.webtoppings[.]bar</span></td>
  </tr>
  <tr>
    <td><span>17</span></td>
    <td><span>WhatsApp (Meta)</span></td>
    <td><span>joingrub-whatsapp-pistol90[.]duckdns[.]org</span></td>
  </tr>
  <tr>
    <td><span>18</span></td>
    <td><span>Rakuten</span></td>
    <td><span>rakutentk[.]com</span></td>
  </tr>
  <tr>
    <td><span>19</span></td>
    <td><span>East Japan Railway Company</span></td>
    <td><span>www[.]jreast[.]co[.]jp[.]card[.]servicelist[].bcens[.]net</span></td>
  </tr>
  <tr>
    <td><span>20</span></td>
    <td><span>American Express Company</span></td>
    <td><span>www[.]webcome-aexp[.]com</span></td>
  </tr>
  <tr>
    <td><span>21</span></td>
    <td><span>KDDI</span></td>
    <td><span>aupay[.]kddi-fshruyrt[.]com</span></td>
  </tr>
  <tr>
    <td><span>22</span></td>
    <td><span>Office365 (Microsoft)</span></td>
    <td><span>office365loginonlinemicrosoft[.]weebly[.]com</span></td>
  </tr>
  <tr>
    <td><span>23</span></td>
    <td><span>Chase Bank</span></td>
    <td><span>safemailschaseonlineserviceupgrade09[.]weebly[.]com</span></td>
  </tr>
  <tr>
    <td><span>24</span></td>
    <td><span>AEON</span></td>
    <td><span>aeon-ver1fy[.]shop</span></td>
  </tr>
  <tr>
    <td><span>25</span></td>
    <td><span>Singtel Optus Pty Limited</span></td>
    <td><span>myoptus[.]mobi</span></td>
  </tr>
  <tr>
    <td><span>26</span></td>
    <td><span>Coinbase Global, Inc.</span></td>
    <td><span>supp0rt-coinbase[.]com</span></td>
  </tr>
  <tr>
    <td><span>27</span></td>
    <td><span>Banco Bradesco S.A.</span></td>
    <td><span>portalbradesco-acesso[.]com</span></td>
  </tr>
  <tr>
    <td><span>28</span></td>
    <td><span>Caixa Econômica Federal</span></td>
    <td><span>lnternetbanklng-caixa[.]com</span></td>
  </tr>
  <tr>
    <td><span>29</span></td>
    <td><span>JCB Co., Ltd.</span></td>
    <td><span>www[.]jcb-co-jp[.]ascaceeccea[.]ioukrg[.]top</span></td>
  </tr>
  <tr>
    <td><span>30</span></td>
    <td><span>ING Group</span></td>
    <td><span>ing-ingdirect-movil[.]com</span></td>
  </tr>
  <tr>
    <td><span>31</span></td>
    <td><span>HSBC Holdings plc</span></td>
    <td><span>hsbc-bm-online[.]com</span></td>
  </tr>
  <tr>
    <td><span>32</span></td>
    <td><span>Netflix Inc</span></td>
    <td><span>renew-netflix[.]com</span></td>
  </tr>
  <tr>
    <td><span>33</span></td>
    <td><span>Sumitomo Mitsui Banking Corporation</span></td>
    <td><span>smbc[.]co[.]jp[.]xazee[.]com</span></td>
  </tr>
  <tr>
    <td><span>34</span></td>
    <td><span>Nubank</span></td>
    <td><span>nuvip2[.]ru</span></td>
  </tr>
  <tr>
    <td><span>35</span></td>
    <td><span>Bank Millennium SA</span></td>
    <td><span>www[.]bankmillenium-pl[.]com</span></td>
  </tr>
  <tr>
    <td><span>36</span></td>
    <td><span>National Police Agency Japan</span></td>
    <td><span>sun[.]pollice[.]xyz</span></td>
  </tr>
  <tr>
    <td><span>37</span></td>
    <td><span>Allegro</span></td>
    <td><span>powiadomienieallegro[.]net</span></td>
  </tr>
  <tr>
    <td><span>38</span></td>
    <td><span>InPost</span></td>
    <td><span>www.inpost-polska-lox.order9512951[.]info</span></td>
  </tr>
  <tr>
    <td><span>39</span></td>
    <td><span>Correos</span></td>
    <td><span>correosa[.]online</span></td>
  </tr>
  <tr>
    <td><span>40</span></td>
    <td><span>FedEx</span></td>
    <td><span>fedexpress-couriers[.]com</span></td>
  </tr>
  <tr>
    <td><span>41</span></td>
    <td><span>LinkedIn (Microsoft)</span></td>
    <td><span>linkkedin-2[.]weebly[.]com</span></td>
  </tr>
  <tr>
    <td><span>42</span></td>
    <td><span>United States Postal Service</span></td>
    <td><span>uspstrack-7518276417-addressredelivery-itemnumber.netlify[.]app</span></td>
  </tr>
  <tr>
    <td><span>43</span></td>
    <td><span>Alphabet</span></td>
    <td><span>www[.]googlecom[.]vn10000[.]cc</span></td>
  </tr>
  <tr>
    <td><span>44</span></td>
    <td><span>The Bank of America Corporation</span></td>
    <td><span>baanofamericase8[.]hostfree[.]pw</span></td>
  </tr>
  <tr>
    <td><span>45</span></td>
    <td><span>Deutscher Paketdienst</span></td>
    <td><span>dpd-info[.]net</span></td>
  </tr>
  <tr>
    <td><span>46</span></td>
    <td><span>Banco Itaú Unibanco S.A.</span></td>
    <td><span>silly-itauu[.]netlify[.]app</span></td>
  </tr>
  <tr>
    <td><span>47</span></td>
    <td><span>Steam</span></td>
    <td><span>gift-steam-discord[.]com</span></td>
  </tr>
  <tr>
    <td><span>48</span></td>
    <td><span>Swisscom AG</span></td>
    <td><span>swiss-comch[.]duckdns[.]org</span></td>
  </tr>
  <tr>
    <td><span>49</span></td>
    <td><span>LexisNexis</span></td>
    <td><span>mexce[.]live</span></td>
  </tr>
  <tr>
    <td><span>50</span></td>
    <td><span>Orange S.A.</span></td>
    <td><span>orange-france24[.]yolasite[.]com</span></td>
  </tr>
</tbody>
</table><p><sup>[1] </sup>Phishing sites are typically served on a specific URL and not on the root, e.g., hxxp://example.com/login.html rather than hxxp://example.com/. Full URLs are not provided here.</p>
    <div>
      <h2>Combining threat intelligence capabilities with Zero Trust enforcement</h2>
      <a href="#combining-threat-intelligence-capabilities-with-zero-trust-enforcement">
        
      </a>
    </div>
    <p>The new features become a lot more effective for customers using our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> product suite. You can in fact easily block any confusable domains found as soon as they are detected by creating Cloudflare Gateway or DNS policy rules. This immediately stops your users from resolving or browsing to potentially malicious sites thwarting attacks before they happen.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/383IIsROAH5m5OksbCuoDx/a2c24f7ce128c9eed83477505669710e/image1-12.png" />
            
            </figure>
    <div>
      <h2>Future enhancements</h2>
      <a href="#future-enhancements">
        
      </a>
    </div>
    <p>The new features are just the start of our broader brand infringement and anti-phishing security portfolio.</p>
    <div>
      <h3>Matching against SSL/TLS certificates</h3>
      <a href="#matching-against-ssl-tls-certificates">
        
      </a>
    </div>
    <p>In addition to matching against domains, we plan to also match against new <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL/TLS certificates</a> logged to <a href="/introducing-certificate-transparency-and-nimbus/">Nimbus, our Certificate Transparency log</a>. By analyzing CT logs, we can identify potentially fraudulent certificates that may be used in phishing attacks. This is helpful as certificates are typically created shortly after domain registration in an attempt to give the phishing site more legitimacy by supporting HTTPS.</p>
    <div>
      <h3>Automatic population of managed lists</h3>
      <a href="#automatic-population-of-managed-lists">
        
      </a>
    </div>
    <p>While today customers can script updates to custom lists referenced in a Zero Trust blocking rule, as mentioned above, we plan to automatically add domains to dynamically updating lists. Additionally, we will automatically add matching domains to lists that can be used in Zero Trust rules, e.g. blocking from Gateway.</p>
    <div>
      <h3>Changes in domain ownership and other metadata</h3>
      <a href="#changes-in-domain-ownership-and-other-metadata">
        
      </a>
    </div>
    <p>Lastly, we plan to provide the ability to monitor domains for changes in ownership or other metadata, such as registrant, name servers, or resolved IP addresses. This would enable customers to track changes in key information related to their domains and take appropriate action if necessary.</p>
    <div>
      <h2>Getting started</h2>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>If you’re an Enterprise customer, <a href="https://www.cloudflare.com/lp/brandprotection/">sign up for Beta access</a> for Brand protection now to gain access to private scanning for your domains, save queries and set up alerts on matched domains.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">4BJPrmF5T36llRS5w1sEfr</guid>
            <dc:creator>Alexandra Moraru</dc:creator>
            <dc:creator>Patrick R. Donahue</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to stay safe from phishing]]></title>
            <link>https://blog.cloudflare.com/stay-safe-phishing-attacks/</link>
            <pubDate>Mon, 13 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Phishing attacks come in all sorts of ways to fool people. Email is definitely the most common, but there are others. Here are some tips to help you catch these scams before you fall for them. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gCRILOV4UHIFWg0Yjm3Cd/832bb46081fca777cf62ece6ae7fbda8/image3-8.png" />
            
            </figure><p>As you wake up in the morning feeling sleepy and preoccupied, you receive an urgent email from a seemingly familiar source, and without much thought, you click on a link that you shouldn't have. Sometimes it’s that simple, and this more than <a href="https://en.wikipedia.org/wiki/Phishing">30-year-old phishing</a> method means chaos breaks loose – whether it’s your personal bank account or social media, where an attacker also begins to trick your family and friends; or at your company, with what could mean systems and data being compromised, services being disrupted, and all other subsequent consequences. Following up on our “<a href="/50-most-impersonated-brands-protect-phishing">Top 50 Most Impersonated Brands in phishing attacks</a>” post, here are some tips to catch these scams before you fall for them.</p><p>We’re all human, and responding to or interacting with a malicious email remains the primary way to breach organizations. According to <a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>, 90% of cyber attacks begin with a phishing email, and losses from a similar type of phishing attack, known as business email compromise (BEC), are a <a href="https://www.ic3.gov/Media/Y2022/PSA220504">$43 billion</a> problem facing organizations. One thing is for sure, phishing attacks are getting <a href="https://www.zdnet.com/article/phishing-attacks-are-getting-scarily-sophisticated-heres-what-to-watch-out-for/">more sophisticated</a> every day thanks to emerging tools like <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">AI</a> chatbots and the expanded usage of various communication apps (Teams, Google Chat, Slack, LinkedIn, etc.).</p>
    <div>
      <h3>What is phishing? Where it starts (the hacker’s foot in the door)</h3>
      <a href="#what-is-phishing-where-it-starts-the-hackers-foot-in-the-door">
        
      </a>
    </div>
    <p>Seems simple, but it is always good to remind everyone in simple terms. <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">Email phishing</a> is a deceptive technique where the attacker uses various types of bait, such as a convincing email or link, to trick victims into providing sensitive information or downloading malware. If the bait works — the attacker only needs it to work once — and the victim clicks on that link, the attacker now has a foot in the door to carry out further attacks with potentially devastating consequences. Anyone can be fooled by a general “phish” — but these attacks can also be focused on a single target, with specific information about the victim, called <a href="https://www.cloudflare.com/learning/access-management/spear-phishing/">spear phishing</a>.</p><p>Recent examples of phishing include <a href="https://www.zdnet.com/article/reddit-was-hit-with-a-phishing-attack-how-it-responded-is-a-lesson-for-everyone/">Reddit</a> as a target, Twilio, and also Cloudflare in a similar attack around the same time — we explain here “<a href="/2022-07-sms-phishing-attacks/">The mechanics of a sophisticated phishing scam and how we stopped it</a>” thanks to our own use of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One products</a>. In some cases, a <a href="https://www.zdnet.com/article/lastpass-breach-hackers-put-malware-on-engineers-home-computer-to-steal-their-password/">home computer</a> of an employee as a target can be the door opening for hackers in what is a few weeks later a major breach.</p><p>Some alerts to bear in mind include the UK's <a href="https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest">National Cyber Security Centre</a> (NCSC), that phishing attacks are targeting individuals and organizations in a range of sectors. The <a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">White House</a> National Cybersecurity Strategy (<a href="/the-white-houses-national-cybersecurity-strategy-asks-the-private-sector-to-step-up-to-fight-cyber-attacks-cloudflare-is-ready/">Cloudflare is ready</a> for that) also highlights those risks. <a href="https://www.politico.eu/article/germany-must-overhaul-its-national-security-strategy-interior-minister-says/">Germany</a>, <a href="https://asia.nikkei.com/Politics/Japan-to-upgrade-cyber-defense-allowing-preemptive-measures">Japan</a> or <a href="https://www.theregister.com/2022/12/11/asia_tech_news_roundup/">Australia</a> are working on a similar approach.</p><p>Without further ado, here are some tips to protect yourself from phishing attacks.</p>
    <div>
      <h3>Tips for Staying Safe Online: How to Avoid Being Reeled in By Phishing Scams</h3>
      <a href="#tips-for-staying-safe-online-how-to-avoid-being-reeled-in-by-phishing-scams">
        
      </a>
    </div>
    <ul><li><p><b>Don’t click strategy.</b> If you get an email from your bank or government agencies like the IRS, instead of clicking on a link in the email, go directly to the website itself.</p></li><li><p><b>Look out for misspellings or strange characters in the sender’s email address.</b> Phishing attempts often rely on look-alike domains or ‘from’ emails to encourage clicks. Common tactics are extra or switched letters (microsogft[.]com), omissions (microsft[.]com) or characters that look alike (the letter o and 0, or micr0soft[.]com).</p></li></ul><p>Here's a classic brand impersonation phish, using Chase as the trusted lure:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/h1SMR9A1ycmg7Dj9HVOE6/6b9d3d10adb910a752f3e54cb9e4187b/image1-13.png" />
            
            </figure><p><i>The link in the text body appears to be a Chase domain, but when clicked, it actually opens a SendGrid URL (a known email delivery platform). It then redirects the user to a phishing site impersonating Chase.</i></p><ul><li><p><b>Think before clicking links to “unlock account” or “update payment details.”</b> Technology services were one of the top industries to be used in phishing campaigns, due to the personal information that can be found in our email, online storage, and social media accounts. Hover over a link and confirm it’s a URL you’re familiar with before clicking.</p></li><li><p><b>Be wary of financial-related messages.</b> Financial institutions are the most likely industry to be phished, so pause and assess any messages asking to accept or make a payment.</p></li><li><p><b>Look out for messages that create a sense of urgency.</b> Emails or text messages that warn of a final chance to pick up a package, or last chance to confirm an account, are likely fake. The rise in online shopping during the pandemic has made retail and logistics/shipping companies a hot target for these types of phishing attempts.</p><p>Both financial and package delivery scams typically use the SMS phishing attack, or <a href="https://www.cloudflare.com/learning/access-management/smishing/">smishing</a>, and are related to the attacker’s use of SMS messages to lure the victims. Cloudflare was the target of this type of phishing a few <a href="/2022-07-sms-phishing-attacks/">months ago</a> (it was stopped). Next, we show you an example of a text message from that thwarted attack:</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2cEXTEgMEHvKMsTaQy5rhU/aac7696a55df7022c934738f5f3619e8/image4-8.png" />
            
            </figure><ul><li><p><b>If things sound too good to be true, they probably are.</b> Beware of "limited time offers" for free gifts, exclusive services, or great deals on trips to Hawaii or the Maldives. Phishing emails target our senses of satisfaction, pleasure, and excitement to compel us to make split second decisions without thinking things through. These types of tactics are lures for a user to click on a link or provide sensitive information. Pause, even if it's for a few seconds, and quickly look up the offer online to see if others have received similar offers.</p></li><li><p><b>Very important message from a very important…</b> Phishing emails sometimes mimic high-ranking individuals, urging urgent action such as money transfers or credential sharing. Scrutinize emails with such requests, and verify their authenticity. Contact your manager if the sender is a CEO. For unfamiliar politicians, assess the request's feasibility before responding.</p></li><li><p><b>The message body is full of errors (but beware of AI tools).</b> Poor grammar, spelling, and sentence structure may indicate that an email is not from a reputable source. That said, recent <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">AI</a> text tools have made it easier for hackers or bad actors to create convincing and error-free copies.</p></li><li><p><a href="https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/romance-scams"><b>Romance scam</b></a> <b>emails.</b> These are emails where scammers adopt a fake online identity to gain a victim's affection and trust. They may also send an email that appears to have been sent in error, prompting the recipient to respond and initiating a conversation with the fraudster. This <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">tactic</a> is used to lure victims.</p></li><li><p><b>Use a password manager.</b> Password managers will verify if the <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain name</a> matches what you expect, and will warn you if you try to fill in your password on the wrong domain name.</p></li></ul><p>If you want to apply even greater scrutiny to a potential phishing email, you can check out our <a href="https://www.cloudflare.com/learning/email-security/how-to-identify-a-phishing-email/">learning center</a> to understand what happens when an email does not pass standard authentication methods like SPF, DKIM, or DMARC.</p><p>A few more Cloudflare related trends, besides the <a href="/50-most-impersonated-brands-protect-phishing">Top 50 Most Impersonated Brands</a>, comes from <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Cloudflare Area 1</a>. In 2022, our services focused on email protection <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">identified</a> and kept 2.3 billion unwanted messages out of customer inboxes. On average, we blocked 6.3 million messages per day. That’s almost 44,000 every 10 minutes, which is the time it takes to read a blog post like this one.</p><p>Typically, the type of email threats most used (looking at our Area 1 January 2023 data) are: identity deception, malicious links, brand impersonation, malicious attachments, scam, extortion, account compromise. And there’s also <a href="https://www.cloudflare.com/learning/email-security/what-is-vishing/">voice phishing</a>.</p><p>Voice phishing, also known as vishing, is another common threat and is related to the practice of tricking people into sharing sensitive information through telephone calls. Victims are led to believe they are talking to a trusted entity, such as the tax authority, their employer, or an airline they use. <a href="https://www.cloudflare.com/learning/email-security/what-is-vishing/">Here</a>, you can learn more about protecting yourself or your company from voice phishing.</p><p>Another type of attack is the <a href="https://en.wikipedia.org/wiki/Watering_hole_attack">watering hole attack</a>, where hackers identify websites frequented by users within a targeted organization and then compromise those websites to distribute malware. Those are often times associated with <a href="https://www.ncsc.gov.uk/collection/supply-chain-security/watering-hole-attacks">supply chain</a> exploitation.</p><p>Next, we show a phishing email example that was received from a real vendor that got an email account hacked in what is called vendor invoice fraud:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5C0DZNm32YUwgRjGmPdEid/313f535eb5a0329856426795f1412fd2/image2-7.png" />
            
            </figure><p>Last but not least in our list of examples, there’s also Calendar phishing, where a fraudster could potentially use a cloud email account to inject fake invites into target employee calendars. Those are detected and avoided with products in our <a href="/phishing-threat-indicators-in-zero-trust/">Cloudflare Zero Trust</a> product.</p>
    <div>
      <h3>Email Link Isolation approach: a safety net for phishing attacks</h3>
      <a href="#email-link-isolation-approach-a-safety-net-for-phishing-attacks">
        
      </a>
    </div>
    <p>As we wrote <a href="/area1-eli-ga/">recently</a> for <a href="https://www.cloudflare.com/cio-week/updates/">CIO Week</a>, there’s also a possible safety net, even if the best trained user mistakes a good link from a bad link. Leveraging the <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> service, <a href="/area1-eli-ga/">Email Link Isolation</a> turns Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud email security</a> into the most comprehensive <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">solution</a> when it comes to protecting against phishing attacks that go beyond just email. It rewrites and isolates links that could be exploited, keeps users vigilant by alerting them of the uncertainty around the website they’re about to visit, and protects against malware and vulnerabilities. Also, in true Cloudflare fashion, it’s a one-click deployment. Check the related <a href="/area1-eli-ga/">blog post</a> to learn more.</p><p>That said, not all malicious links come from emails. If you're concerned about malicious links that may come through Instant Messaging or other communication tools (Slack, iMessage, Facebook, Instagram, WhatsApp, etc), <a href="https://www.cloudflare.com/products/zero-trust/">Zero Trust</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation</a> are an effective way to go.</p><p>Another way to protect yourself from phishing attacks is to use <a href="https://www.cloudflare.com/learning/access-management/what-is-two-factor-authentication/">two-factor authentication</a> (2FA). It works as an extra layer of security for user accounts, making it more difficult for attackers to gain unauthorized access. By requiring a second factor, even if an attacker has your password, they still cannot access your account.</p><p>While 2FA by a code generated by a mobile app or sent via SMS (also prone to SIM jacking attacks) is an option, those could also be asked for by phishing sites. The safest way to use 2FA is by using hardware security keys, which are tied to the genuine site. This is why Cloudflare has been keen to highlight that method, both <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">internally</a> and <a href="https://www.cloudflare.com/press-releases/2022/cloudflare-democratizes-hardware-security-keys/">externally</a> or in our <a href="https://www.cloudflare.com/products/zero-trust/phishing-resistant-mfa/">products</a>.</p>
    <div>
      <h3>Conclusion: better safe than sorry</h3>
      <a href="#conclusion-better-safe-than-sorry">
        
      </a>
    </div>
    <p>As we saw, email is one of the most ubiquitous and also most exploited tools that businesses use every single day. Baiting users into clicking malicious links within an email has been a particularly long-standing tactic for the vast majority of bad actors, from the most sophisticated criminal organizations to the least experienced attackers. So, remember, when online:</p><p>Be cautious. Be <a href="https://www.cloudflare.com/products/zero-trust/email-security/">prepared</a>. Be safe.</p><p>If you want to learn more about email security, you can visit our <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">Learning Center</a> or reach out for a complimentary phishing <a href="https://www.cloudflare.com/lp/emailsecurity/">risk assessment</a> for your organization.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">jUpcx0tuA1pNEBGyI9vBU</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[2022 attacks! An August reading list to go “Shields Up”]]></title>
            <link>https://blog.cloudflare.com/2022-attacks-an-august-reading-list-to-go-shields-up/</link>
            <pubDate>Thu, 11 Aug 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ In 2022, cybersecurity, more than ever, is a must-have for those who don’t want to take chances on getting caught in a cyberattack with difficult to deal with consequences. Here’s a reading list what you need to know about attacks that is also a guide on how to be protected ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WdxQhESmU4TimGkFrxvrP/283d2dc9985cf2c23bd725e5e94e8f35/image4-2.png" />
            
            </figure><p>In 2022, <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> is a must-have for those who don’t want to take chances on getting caught in a cyberattack with difficult to deal consequences. And with a war in Europe (<a href="/tag/ukraine/">Ukraine</a>) still going on, cyberwar also doesn’t show signs of stopping in a time when there never were so many people online, 4.95 billion in early 2022, 62.5% of the world’s total population (<a href="https://datareportal.com/reports/digital-2022-global-overview-report">estimates</a> say it grew around 4% during 2021 and <a href="https://datareportal.com/reports/digital-2021-global-overview-report">7.3%</a> in 2020).</p><p>Throughout the year we, at Cloudflare, have been making new announcements of products, solutions and initiatives that highlight the way we have been <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">preventing</a>, mitigating and constantly learning, over the years, with several thousands of small and big cyberattacks. Right now, we block an average of 124 billion cyber threats per day. The more we deal with attacks, the more we know how to stop them, and the easier it gets to find and deal with new threats — and for customers to forget we’re there, protecting them.</p><p>In 2022, we have been onboarding many customers while they’re being attacked, something we know well from the past (<a href="https://www.cloudflare.com/case-studies/wikimedia-foundation/">Wikimedia/Wikipedia</a> or <a href="https://www.cloudflare.com/case-studies/eurovision/">Eurovision</a> are just two case-studies of <a href="https://www.cloudflare.com/case-studies">many</a>, and last year there was a Fortune Global 500 company example we <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">wrote about</a>). Recently, we dealt and did a <a href="/2022-07-sms-phishing-attacks/">rundown</a> about an SMS phishing attack.</p><p>Providing services for <a href="https://w3techs.com/technologies/overview/proxy/all">almost 20%</a> of websites online and to millions of Internet properties and customers using our global network in more than <a href="/new-cities-april-2022-edition/">270 cities</a> (recently we arrived to <a href="/cloudflare-deployment-in-guam/">Guam</a>) also plays a big role. For example, in Q1’22 Cloudflare blocked an average of 117 billion cyber threats each day (much more than in previous quarters).</p><p>Now that August is here, and many in the Northern Hemisphere are enjoying the summer and vacations, let’s do a reading list that is also a sum up focused on cyberattacks that also gives, by itself, some 2022 guide on this more than ever relevant area.</p>
    <div>
      <h2>War &amp; Cyberwar: Attacks increasing</h2>
      <a href="#war-cyberwar-attacks-increasing">
        
      </a>
    </div>
    <p>But first, some context. There are all sorts of attacks, but they have been generally speaking increasing and just to give some of our data regarding <a href="/ddos-attack-trends-for-2022-q2/">DDoS attacks in 2022 Q2</a>: ​​application-layer attacks increased by 72% YoY (Year over Year) and network-layer DDoS attacks increased by 109% YoY.</p><p>The US government gave “warnings” back in March, after the war in Ukraine started, to all in the country but also allies and partners to be aware of the need to “enhance cybersecurity”. The US Cybersecurity and Infrastructure Security Agency (CISA) created the <a href="https://www.cisa.gov/shields-up">Shields Up</a> initiative, given how the “Russia’s invasion of Ukraine could impact organizations both within and beyond the region”. The <a href="/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/#:~:text=National%20Cyber%20Security%20Center">UK</a> and <a href="https://www.meti.go.jp/press/2021/02/20220221003/20220221003.html">Japan</a>, among others, also issued warnings.</p><p>That said, here are the two first and more general about attacks reading list suggestions:</p><p><b>Shields up: free Cloudflare services to improve your cyber readiness (</b><a href="/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/"><b>✍️</b></a><b>)</b>After the war started and governments released warnings, we did this free Cloudflare services cyber readiness sum up <a href="/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/">blog post</a>. If you’re a seasoned IT professional or a novice website operator, you can see a variety of services for websites, apps, or APIs, including DDoS mitigation and protection of teams or even personal devices (from phones to routers). If this resonates with you, this announcement of collaboration to simplify the adoption of Zero Trust for IT and security teams could also be useful: <a href="/cloudflare-crowdstrike-partnership/">CrowdStrike’s endpoint security meets Cloudflare’s Zero Trust Services</a>.</p><p><b>In Ukraine and beyond, what it takes to keep vulnerable groups online (</b><a href="/in-ukraine-and-beyond-what-it-takes-to-keep-vulnerable-groups-online/"><b>✍️</b></a><b>)</b>This <a href="/in-ukraine-and-beyond-what-it-takes-to-keep-vulnerable-groups-online/">blog post</a> is focused on the eighth anniversary of our <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, that has been helping human-rights, journalism and non-profits public interest organizations or groups. We highlight the trends of the past year, including the dozens of organizations related to <a href="/tag/Ukraine">Ukraine</a> that were onboarded (many while being attacked) since the war started. Between July 2021 and May 2022, we’ve blocked an average of nearly 57.9 million cyberattacks per day, an increase of nearly 10% over last year in a total of 18 billion attacks.</p><p>In terms of attack methods to Galileo protected organizations, the largest fraction (28%) of mitigated requests were classified as “HTTP Anomaly”, with 20% of mitigated requests tagged as <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection or SQLi attempts</a> (to target databases) and nearly 13% as attempts to exploit specific <a href="https://www.cve.org/">CVEs</a> (publicly disclosed cybersecurity vulnerabilities) — you can find more insights about those <a href="/tag/cve/">here</a>, including the <a href="/waf-mitigations-spring4shell/">Spring4Shell</a> vulnerability, the <a href="/tag/log4j/">Log4j</a> or the <a href="/cloudflare-customers-are-protected-from-the-atlassian-confluence-cve-2022-26134/">Atlassian</a> one.</p><p>And now, without further ado, here’s the full reading list/attacks guide where we highlight some blog posts around four main topics:</p>
    <div>
      <h2>1. DDoS attacks &amp; solutions</h2>
      <a href="#1-ddos-attacks-solutions">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xhurw0Ra8EQ5RTgWXrEIz/efd281a15340a5e0765cdfb904fdd9c9/image5-2.png" />
            
            </figure><p>The most powerful botnet to date, <a href="/mantis-botnet/">Mantis</a>.</p><p><b>Cloudflare mitigates 26 million request per second DDoS attack (</b><a href="/26m-rps-ddos/"><b>✍️</b></a><b>)</b><a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service (DDoS)</a> are the bread and butter of <a href="https://portswigger.net/daily-swig/nation-state-threat-how-ddos-over-tcp-technique-could-amplify-attacks">state-based</a> attacks, and we’ve been <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">automatically</a> detecting and mitigating them. Regardless of which country initiates them, bots are all around the world and <a href="/26m-rps-ddos/">in this blog post</a> you can see a specific example on how big those attacks can be (in this case the attack targeted a customer website using Cloudflare’s Free plan). We’ve named this most powerful botnet to date, <a href="/mantis-botnet/">Mantis</a>.</p><p>That said, we also explain that although most of the attacks are small, e.g. cyber vandalism, even small attacks can severely impact unprotected Internet properties.</p><p><b>DDoS attack trends for 2022 Q2 (</b><a href="/ddos-attack-trends-for-2022-q2/"><b>✍️</b></a><b>)</b>We already mentioned how application (72%) and network-layer (109%) attacks have been growing year over year — in the latter, attacks of 100 Gbps and larger increased by 8% QoQ, and attacks lasting more than 3 hours increased by 12% QoQ. <a href="/ddos-attack-trends-for-2022-q2/"><b>Here</b></a> you can also find interesting trends, like how Broadcast Media companies in Ukraine were the most targeted in Q2 2022 by DDoS attacks. In fact, all the top five most attacked industries are all in online/Internet media, publishing, and broadcasting.</p><p><b>Cloudflare customers on Free plans can now also get real-time DDoS alerts</b> <b>(</b><a href="/free-ddos-alerts/"><b>✍️</b></a><b>)</b>A DDoS is cyber-attack that attempts to disrupt your online business and can be used in any type of Internet property, server, or network (whether it relies on <a href="/attacks-on-voip-providers/">VoIP</a> servers, UDP-based gaming servers, or HTTP servers). That said, our <a href="https://www.cloudflare.com/plans/free/">Free plan</a> can now get real-time alerts about HTTP DDoS attacks that were automatically detected and mitigated by us.</p><p>One of the benefits of Cloudflare is that all of our services and features can work together to protect your website and also improve its performance. Here’s our specialist, <a href="/author/omer/">Omer Yoachimik</a>, top 3 tips to leverage a <a href="https://www.cloudflare.com/plans/free/">Cloudflare free account</a> (and put your settings more efficient to deal with DDoS attacks):</p><ol><li><p>Put Cloudflare in front of your website:</p><ul><li><p><a href="https://developers.cloudflare.com/dns/zone-setups/full-setup/setup/">Onboard your website to Cloudflare</a> and ensure all of your HTTP traffic routes through Cloudflare. Lock down your origin server, so it only accepts traffic from <a href="https://developers.cloudflare.com/fundamentals/get-started/setup/allow-cloudflare-ip-addresses/">Cloudflare IPs</a>.</p></li></ul></li><li><p>Leverage Cloudflare’s free security features</p><ul><li><p><b>DDoS Protection</b>: it’s enabled by default, and if needed you can also <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adjust-rules/false-negative/#incomplete-mitigations">override the action to Block</a> for rules that have a different default value.</p></li><li><p><b>Security Level</b>: this feature will automatically issue challenges to requests that originate from IP addresses with low IP reputation. Ensure it's <a href="https://support.cloudflare.com/hc/en-us/articles/200170056-Understanding-the-Cloudflare-Security-Level">set to Medium</a> at least.</p></li><li><p><b>Block bad bots</b> - Cloudflare’s free tier of <a href="https://developers.cloudflare.com/bots/plans/free/">bot protection</a> can help ward off simple bots (from cloud ASNs) and headless browsers by issuing a computationally expensive challenge.</p></li><li><p><b>Firewall rules</b>: you can create up to five free <a href="https://developers.cloudflare.com/firewall/">custom firewall rules</a> to block or challenge traffic that you never want to receive.</p></li><li><p><b>Managed Ruleset</b>: in addition to your custom rule, enable Cloudflare’s <a href="https://developers.cloudflare.com/waf/managed-rulesets/">Free Managed Ruleset</a> to protect against high and wide impacting vulnerabilities</p></li></ul></li><li><p>Move your content to the cloud</p><ul><li><p><a href="https://developers.cloudflare.com/cache/">Cache</a> as much of your content as possible on the Cloudflare network. The fewer requests that hit your origin, the better — including unwanted traffic.</p></li></ul></li></ol>
    <div>
      <h2>2. Application level attacks &amp; WAF</h2>
      <a href="#2-application-level-attacks-waf">
        
      </a>
    </div>
    <p><b>Application security: Cloudflare’s view (</b><a href="/application-security/"><b>✍️</b></a><b>)</b>Did you know that around 8% of all Cloudflare HTTP traffic is mitigated? That is something we explain in this application's general trends March 2022 <a href="/application-security/">blog post</a>. That means that overall, ~2.5 million requests per second are mitigated by our global network and never reach our caches or the origin servers, ensuring our customers’ bandwidth and compute power is only used for clean traffic.</p><p>You can also have a sense here of what the top mitigated traffic sources are — Layer 7 DDoS and Custom WAF (<a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall</a>) rules are at the top — and what are the most common attacks. Other highlights include that at that time 38% of HTTP traffic we see is automated (right the number is actually lower, 31% — current trends can be seen on <a href="https://radar.cloudflare.com/">Radar</a>), and the already mentioned (about Galileo) SQLi is the most common attack vector on API endpoints.</p><p><b>WAF for everyone: protecting the web from high severity vulnerabilities (</b><a href="/waf-for-everyone/"><b>✍️</b></a><b>)</b>This <a href="/waf-for-everyone/">blog post</a> shares a relevant announcement that goes hand in hand with Cloudflare mission of "help build a better Internet" and that also includes giving some level of protection even without costs (something that also help us be better in preventing and mitigating attacks). So, since March we are providing a Cloudflare WAF Managed Ruleset that is running by default on all FREE zones, free of charge.</p><p>On this topic, there has also been a growing client side security number of threats that concerns CIOs and security professionals that we mention when we gave, in December, all paid plans access to <a href="/page-shield-generally-available/">Page Shield features</a> (last <a href="/making-page-shield-malicious-code-alerts-more-actionable/">month</a> we made Page Shield malicious code alerts more actionable. Another example is how we detect <a href="/detecting-magecart-style-attacks-for-pageshield/">Magecart-Style attacks</a> that have impacted large organizations like <a href="https://www.bbc.co.uk/news/technology-54568784">British Airways</a> and <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/11/ico-fines-ticketmaster-uk-limited-125million-for-failing-to-protect-customers-payment-details/">Ticketmaster</a>, resulting in substantial GDPR fines in both cases.</p>
    <div>
      <h2>3. Phishing (Area 1)</h2>
      <a href="#3-phishing-area-1">
        
      </a>
    </div>
    <p><b>Why we are acquiring Area 1 (</b><a href="/why-we-are-acquiring-area-1/"><b>✍️</b></a><b>)</b>Phishing remains the primary way to breach organizations. According to <a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>, 90% of cyber attacks begin with it. And, in a recent report, the <a href="https://www.ic3.gov/Media/Y2022/PSA220504">FBI</a> referred to Business Email Compromise as the $43 Billion problem facing organizations.</p><p>It was in late February that it was announced that Cloudflare had agreed to acquire Area 1 Security to help organizations combat <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">advanced email attacks and phishing campaigns</a>. Our <a href="/why-we-are-acquiring-area-1/">blog post</a> explains that “Area 1’s team has built exceptional cloud-native technology to protect businesses from email-based security threats”. So, all that technology and expertise has been integrated since then with our global network to give customers the most complete Zero Trust security platform available.</p><p><b>The mechanics of a sophisticated phishing scam and how we stopped it (</b><a href="/2022-07-sms-phishing-attacks/"><b>✍️</b></a><b>)</b>What’s in a message? Possibly a sophisticated attack targeting employees and systems. On August 8, 2022, Twilio shared that they’d been compromised by a targeted SMS phishing attack. We saw an attack with very similar characteristics also targeting Cloudflare’s employees. <a href="/2022-07-sms-phishing-attacks/">Here</a>, we do a rundown on how we were able to thwart the attack that could have breached most organizations, by using our Cloudflare One products, and physical security keys. And how others can do the same. No Cloudflare systems were compromised.</p><p>Our <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> threat intelligence team dissected the attack and assisted in tracking down the attacker.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/br7n6YlxPChn033jKhwTR/321d5120fe7dbd0d8084d4c2f31b461e/image3-6.png" />
            
            </figure><p><b>Introducing browser isolation for email links to stop modern phishing threats (</b><a href="/email-link-isolation/"><b>✍️</b></a><b>)</b>Why do humans <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7005690/">still click</a> on malicious links? It seems that it’s easier to do it than most people think (“human error is human”). <a href="/email-link-isolation/">Here</a> we explain how an organization nowadays can't truly have a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security posture</a> without securing email; an application that end users implicitly trust and threat actors take advantage of that inherent trust.</p><p>As part of our journey to integrate Area 1 into our broader Zero Trust suite, Cloudflare Gateway customers can enable <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation</a> for email links. With that, we now give unmatched level of protection from modern multi-channel email-based attacks. While we’re at it, you can also learn <a href="/replace-your-email-gateway-with-area-1/">how to replace your email gateway with Cloudflare Area 1</a>.</p><p>About account takeovers, we explained back in March 2021 <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">how we prevent account takeovers</a> on our own applications (on the phishing side we were already using, as a customer, at the time, Area 1).</p><p>Also from last year, <a href="/research-directions-in-password-security/">here’s</a> our research in <b>password security</b> (and the problem of password reuse) — it gets technical. There’s a new password related protocol called OPAQUE (<a href="https://opaque-full.research.cloudflare.com/">we added a new demo about it on January 2022</a>) that could help better store secrets that our research team is excited about.</p>
    <div>
      <h2>4. Malware/Ransomware &amp; other risks</h2>
      <a href="#4-malware-ransomware-other-risks">
        
      </a>
    </div>
    <p><b>How Cloudflare Security does Zero Trust (</b><a href="/how-cloudflare-security-does-zero-trust/"><b>✍️</b></a><b>)</b>Security is more than ever part of an ecosystem that the more robust, the more efficient in avoiding or mitigating attacks. In this <a href="/how-cloudflare-security-does-zero-trust/">blog post</a> written for our <a href="https://www.cloudflare.com/cloudflare-one-week/">Cloudflare One week</a>, we explain how that ecosystem, in this case inside our Zero Trust services, can give protection from malware, ransomware, phishing, command &amp; control, shadow IT, and other Internet risks over all ports and protocols.</p><p>Since 2020, we launched <a href="/announcing-antivirus-in-cloudflare-gateway/">Cloudflare Gateway</a> focused on malware detection and prevention directly from the Cloudflare edge. Recently, we also include our new <a href="https://www.cloudflare.com/products/zero-trust/casb/">CASB</a> product (to secure workplace tools, personalize access, secure sensitive data).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4JXI6TtKH5z3SNlVUOM4P4/367b94a7e9e0f518374822ff2f8e7d97/image1-14.png" />
            
            </figure><p><b>Anatomy of a Targeted Ransomware Attack (</b><a href="/targeted-ransomware-attack/"><b>✍️</b></a><b>)</b>What a ransomware attack looks like for the victim:</p><blockquote><p><i>“Imagine your most critical systems suddenly stop operating. And then someone demands a ransom to get your systems working again. Or someone launches a DDoS against you and demands a ransom to make it stop. That’s the world of ransomware and ransom DDoS.”</i></p></blockquote><p>Ransomware attacks continue <a href="https://www.kroll.com/en/insights/publications/cyber/ransomware-attack-trends-2020">to be on the rise</a> and there’s no sign of them slowing down in the near future. That was true more than a year ago, when this <a href="/targeted-ransomware-attack/">blog post</a> was written and is still <a href="https://www.fitchratings.com/research/corporate-finance/ransomware-growing-cyber-risk-for-us-corporates-financials-govt-27-04-2022">ongoing</a>, up 105% YoY according to a Senate Committee March 2022 report. And the nature of ransomware attacks is changing. Here, we highlight how <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS (RDDoS)</a> attacks work, how Cloudflare onboarded and <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">protected</a> a Fortune 500 customer from a targeted one, and how that <a href="/announcing-antivirus-in-cloudflare-gateway/">Gateway with antivirus</a> we mentioned before helps with just that.</p><p>We also show that with ransomware as a service (<a href="https://www.crowdstrike.com/cybersecurity-101/ransomware/ransomware-as-a-service-raas/">RaaS</a>) models, it’s even easier for inexperienced threat actors to get their hands on them today (“RaaS is essentially a franchise that allows criminals to rent ransomware from malware authors”). We also include some general recommendations to help you and your organization stay secure. Don’t want to click the link? Here they are:</p><ul><li><p>Use 2FA everywhere, especially on your remote access entry points. This is where Cloudflare Access really helps.</p></li><li><p>Maintain multiple redundant backups of critical systems and data, both onsite and offsite</p></li><li><p>Monitor and block malicious domains using Cloudflare Gateway + AV</p></li><li><p>Sandbox web browsing activity using Cloudflare RBI to isolate threats at the browser</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2A9QpWsLw6VCvL1l757YgV/9f4d71288d5920aeab4fe0b5f27c4091/image2-7.png" />
            
            </figure><p><b>Investigating threats using the Cloudflare Security Center (</b><a href="/security-center-investigate/"><b>✍️</b></a><b>)</b><a href="/security-center-investigate/">Here</a>, first we announce our new threat investigations portal, <i>Investigate</i>, right in the Cloudflare Security Center, that allows all customers to query directly our intelligence to streamline security workflows and tighten feedback loops.</p><p>That’s only possible because we have a global and in-depth view, given that we <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect millions of Internet properties from attacks</a> (the free plans help us to have that insight). And the data we glean from these attacks trains our machine learning models and improves the efficacy of our network and <a href="https://www.cloudflare.com/application-services/solutions/">application security products</a>.</p><p><b>Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia (</b><a href="/steps-taken-around-cloudflares-services-in-ukraine-belarus-and-russia/"><b>✍️</b></a><b>)</b>There’s an emergence of the known as <a href="https://en.wikipedia.org/wiki/Wiper_(malware)">wiper</a> malware attacks (intended to erase the computer it infects) and in this <a href="/steps-taken-around-cloudflares-services-in-ukraine-belarus-and-russia/">blog post</a>, among other things, we explain how when a wiper malware was identified in Ukraine (it took offline government agencies and a major bank), we successfully adapted our Zero Trust products to make sure our customers were protected. Those protections include many Ukrainian organizations, under our <a href="/in-ukraine-and-beyond-what-it-takes-to-keep-vulnerable-groups-online/">Project Galileo</a> that is having a busy year, and they were automatically put available to all our customers. More recently, the satellite provider Viasat was <a href="https://techcrunch.com/2022/05/10/russia-viasat-cyberattack/">affected</a>.</p><p><b>Zaraz use Workers to make third-party tools secure and fast (</b><a href="/zaraz-use-workers-to-make-third-party-tools-secure-and-fast/"><b>✍️</b></a><b>)</b>Cloudflare announced it acquired <a href="/cloudflare-acquires-zaraz-to-enable-cloud-loading-of-third-party-tools/">Zaraz</a> in December 2021 to help us enable cloud loading of third-party tools. Seems unrelated to attacks? Think again (this takes us back to the secure ecosystem I already mentioned). Among other things, <a href="/zaraz-use-workers-to-make-third-party-tools-secure-and-fast/"><b>here</b></a> you can learn how Zaraz can make your website more secure (and faster) by offloading third-party scripts.</p><p>That allows to avoid problems and attacks. Which? From code tampering to lose control over the data sent to third-parties. My colleague <a href="/author/yoav/">Yo'av Moshe</a> elaborates on what this solution prevents: “the third-party script can intentionally or unintentionally (due to being hacked) collect information it shouldn't collect, like credit card numbers, Personal Identifiers Information (PIIs), etc.”. You should definitely avoid those.</p><p><b>Introducing Cloudforce One: our new threat operations and research team (</b><a href="/introducing-cloudforce-one-threat-operations-and-threat-research/"><b>✍️</b></a><b>)</b><a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Meet</a> our new threat operations and research team: <b>Cloudforce One</b>. While this team will publish research, that’s not its reason for being. Its primary objective: track and disrupt threat actors. It’s all about being protected against a great flow of threats with minimal to no involvement.</p>
    <div>
      <h2>Wrap up</h2>
      <a href="#wrap-up">
        
      </a>
    </div>
    <p>The expression “if it ain't broke, don't fix it” doesn’t seem to apply to the fast pacing Internet industry, where attacks are also in the fast track. If you or your company and services aren’t properly protected, attackers (human or bots) will probably find you sooner than later (maybe they already did).</p><p>To end on a popular quote used in books, movies and in life: “You keep knocking on the devil's door long enough and sooner or later someone's going to answer you”. Although we have been onboarding many organizations while attacks are happening, that’s not the less hurtful solution — preventing and mitigating effectively and forget the protection is even there.</p><p>If you want to try some security features mentioned, the <a href="https://www.cloudflare.com/securitycenter/">Cloudflare Security Center</a> is a good place to start (free plans included). The same with our <a href="https://www.cloudflare.com/plans/zero-trust-services/">Zero Trust ecosystem</a> (or <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> as our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a>, Secure Access Service Edge) that is available as self-serve, and also includes a free plan (this vendor-agnostic <a href="https://zerotrustroadmap.org/">roadmap</a> shows the general advantages of the Zero Trust architecture).</p><p>If trends are more your thing, <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> has a near real-time dedicated area about attacks, and you can browse and interact with our <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2">DDoS attack trends for 2022 Q2</a> report.</p> ]]></content:encoded>
            <category><![CDATA[Reading List]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">5OwoJQTgAgPoadve5G7UsL</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[The mechanics of a sophisticated phishing scam and how we stopped it]]></title>
            <link>https://blog.cloudflare.com/2022-07-sms-phishing-attacks/</link>
            <pubDate>Tue, 09 Aug 2022 15:56:30 GMT</pubDate>
            <description><![CDATA[ Yesterday, August 8, 2022, Twilio shared that they’d been compromised by a targeted phishing attack. Around the same time as Twilio was attacked, we saw an attack with very similar characteristics also targeting Cloudflare’s employees ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Yesterday, August 8, 2022, Twilio shared that they’d been <a href="https://www.twilio.com/blog/august-2022-social-engineering-attack">compromised by a targeted phishing attack</a>. Around the same time as Twilio was attacked, we saw an attack with very similar characteristics also targeting Cloudflare’s employees. While individual employees did fall for the phishing messages, we were able to thwart the attack through our own use of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One products</a>, and physical security keys issued to every employee that are required to access all our applications.</p><p>We have confirmed that no Cloudflare systems were compromised. Our <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One threat intelligence team</a> was able to perform additional analysis to further dissect the mechanism of the attack and gather critical evidence to assist in tracking down the attacker.</p><p>This was a sophisticated attack targeting employees and systems in such a way that we believe most organizations would be likely to be breached. Given that the attacker is targeting multiple organizations, we wanted to share here a rundown of exactly what we saw in order to help other companies recognize and mitigate this attack.</p>
    <div>
      <h2>Targeted Text Messages</h2>
      <a href="#targeted-text-messages">
        
      </a>
    </div>
    <p>On July 20, 2022, the Cloudflare Security team received reports of employees receiving legitimate-looking text messages pointing to what appeared to be a Cloudflare Okta login page. The messages began at 2022-07-20 22:50 UTC. Over the course of less than 1 minute, at least 76 employees received text messages on their personal and work phones. Some messages were also sent to the employees family members. We have not yet been able to determine how the attacker assembled the list of employees phone numbers but have reviewed access logs to our employee directory services and have found no sign of compromise.</p><p>Cloudflare runs a 24x7 Security Incident Response Team (SIRT). Every Cloudflare employee is trained to report anything that is suspicious to the SIRT. More than 90 percent of the reports to SIRT turn out to not be threats. Employees are encouraged to report anything and never discouraged from over-reporting. In this case, however, the reports to SIRT were a real threat.</p><p>The text messages received by employees looked like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NzSGBSGfCogIk4BXWmXND/cb4bc7d2f174f8b360b7c51664e71f66/image3-5.png" />
            
            </figure><p>They came from four phone numbers associated with T-Mobile-issued SIM cards: (754) 268-9387, (205) 946-7573, (754) 364-6683 and (561) 524-5989. They pointed to an official-looking domain: cloudflare-okta.com. That domain had been registered via Porkbun, a <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">domain registrar</a>, at 2022-07-20 22:13:04 UTC — less than 40 minutes before the phishing campaign began.</p><p>Cloudflare built our <a href="https://www.cloudflare.com/products/registrar/custom-domain-protection/">secure registrar product</a> in part to be able to monitor when domains using the Cloudflare brand were registered and get them shut down. However, because this domain was registered so recently, it had not yet been published as a new .com registration, so our systems did not detect its registration and our team had not yet moved to terminate it.</p><p>If you clicked on the link it took you to a phishing page. The phishing page was hosted on DigitalOcean and looked like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/32GWziRZv7ijycvETvNHny/58f811265c86872398b876d64f65a55d/image1-13.png" />
            
            </figure><p>Cloudflare uses Okta as our identity provider. The phishing page was designed to look identical to a legitimate Okta login page. The phishing page prompted anyone who visited it for their username and password.</p>
    <div>
      <h2>Real-Time Phishing</h2>
      <a href="#real-time-phishing">
        
      </a>
    </div>
    <p>We were able to analyze the payload of the <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing attack</a> based on what our employees received as well as its content being posted to services like VirusTotal by other companies that had been attacked. When the phishing page was completed by a victim, the credentials were immediately relayed to the attacker via the messaging service Telegram. This real-time relay was important because the phishing page would also prompt for a Time-based One Time Password (TOTP) code.</p><p>Presumably, the attacker would receive the credentials in real-time, enter them in a victim company’s actual login page, and, for many organizations that would generate a code sent to the employee via SMS or displayed on a password generator. The employee would then enter the TOTP code on the phishing site, and it too would be relayed to the attacker. The attacker could then, before the TOTP code expired, use it to access the company’s actual login page — defeating most two-factor authentication implementations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6kHLCU7dpKptSuJXwOy39X/0da593615149665ba8f7360e4232a996/image2-6.png" />
            
            </figure>
    <div>
      <h2>Protected Even If Not Perfect</h2>
      <a href="#protected-even-if-not-perfect">
        
      </a>
    </div>
    <p>We confirmed that three Cloudflare employees fell for the phishing message and entered their credentials. However, Cloudflare does not use TOTP codes. Instead, every employee at the company is issued a FIDO2-compliant security key from a vendor like YubiKey. Since the hard keys are tied to users and implement <a href="https://www.yubico.com/blog/creating-unphishable-security-key/">origin binding</a>, even a sophisticated, real-time phishing operation like this cannot gather the information necessary to log in to any of our systems. While the attacker attempted to log in to our systems with the compromised username and password credentials, they could not get past the hard key requirement.</p><p>But this phishing page was not simply after credentials and TOTP codes. If someone made it past those steps, the phishing page then initiated the download of a phishing payload which included AnyDesk’s remote access software. That software, if installed, would allow an attacker to control the victim’s machine remotely. We confirmed that none of our team members got to this step. If they had, however, our endpoint security would have stopped the installation of the remote access software.</p>
    <div>
      <h2>How Did We Respond?</h2>
      <a href="#how-did-we-respond">
        
      </a>
    </div>
    <p>The main response actions we took for this incident were:</p>
    <div>
      <h3>1. Block the phishing domain using Cloudflare Gateway</h3>
      <a href="#1-block-the-phishing-domain-using-cloudflare-gateway">
        
      </a>
    </div>
    <p>Cloudflare Gateway is a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/">Secure Web Gateway</a> solution providing threat and data protection with DNS / HTTP filtering and natively-integrated <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>. We use this  solution internally to proactively identify malicious domains and block them. Our team added the malicious domain to Cloudflare Gateway to block all employees from accessing it.</p><p>Gateway’s automatic detection of malicious domains also identified the domain and blocked it, but the fact that it was registered and messages were sent within such a short interval of time meant that the system hadn’t automatically taken action before some employees had clicked on the links. Given this incident we are working to speed up how quickly malicious domains are identified and blocked. We’re also implementing controls on access to newly registered domains which we offer to customers but had not implemented ourselves.</p>
    <div>
      <h3>2. Identify all impacted Cloudflare employees and reset compromised credentials</h3>
      <a href="#2-identify-all-impacted-cloudflare-employees-and-reset-compromised-credentials">
        
      </a>
    </div>
    <p>We were able to compare recipients of the phishing texts to login activity and identify threat-actor attempts to authenticate to our employee accounts. We identified login attempts blocked due to the hard key (U2F) requirements indicating that the correct password was used, but the second factor could not be verified. For the three of our employees' credentials were leaked, we reset their credentials and any active sessions and initiated scans of their devices.</p>
    <div>
      <h3>3. Identify and take down threat-actor infrastructure</h3>
      <a href="#3-identify-and-take-down-threat-actor-infrastructure">
        
      </a>
    </div>
    <p>The threat actor's phishing domain was newly registered via Porkbun, and hosted on DigitalOcean. The phishing domain used to target Cloudflare was set up less than an hour before the initial phishing wave. The site had a Nuxt.js frontend, and a Django backend. We worked with DigitalOcean to shut down the attacker’s server. We also worked with Porkbun to seize control of the malicious domain.</p><p>From the failed sign-in attempts we were able to determine that the threat actor was leveraging Mullvad VPN software and distinctively using the Google Chrome browser on a Windows 10 machine. The VPN IP addresses used by the attacker were 198.54.132.88, and 198.54.135.222. Those IPs are assigned to Tzulo, a US-based dedicated server provider whose website claims they have servers located in Los Angeles and Chicago. It appears, actually, that the first was actually running on a server in the Toronto area and the latter on a server in the Washington, DC area. We blocked these IPs from accessing any of our services.</p>
    <div>
      <h3>4. Update detections to identify any subsequent attack attempts</h3>
      <a href="#4-update-detections-to-identify-any-subsequent-attack-attempts">
        
      </a>
    </div>
    <p>With what we were able to uncover about this attack, we incorporated additional signals to our already existing detections to specifically identify this threat-actor. At the time of writing we have not observed any additional waves targeting our employees. However, intelligence from the server indicated the attacker was targeting other organizations, including Twilio. We reached out to these other organizations and shared intelligence on the attack.</p>
    <div>
      <h3>5. Audit service access logs for any additional indications of attack</h3>
      <a href="#5-audit-service-access-logs-for-any-additional-indications-of-attack">
        
      </a>
    </div>
    <p>Following the attack, we screened all our system logs for any additional fingerprints from this particular attacker. Given Cloudflare Access serves as the central control point for all Cloudflare applications, we can search the logs for any indication the attacker may have breached any systems. Given employees’ phones were targeted, we also carefully reviewed the logs of our employee directory providers. We did not find any evidence of compromise.</p>
    <div>
      <h2>Lessons Learned and Additional Steps We’re Taking</h2>
      <a href="#lessons-learned-and-additional-steps-were-taking">
        
      </a>
    </div>
    <p>We learn from every attack. Even though the attacker was not successful, we are making additional adjustments from what we’ve learned. We’re adjusting the settings for Cloudflare Gateway to restrict or sandbox access to sites running on domains that were registered within the last 24 hours. We will also run any non-allow listed sites containing terms such as “cloudflare” “okta” “sso” and “2fa” through our <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation technology</a>. We are also increasingly using <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Cloudflare Area 1’s phish-identification technology</a> to scan the web and look for any pages that are designed to target Cloudflare. Finally, we’re tightening up our Access implementation to prevent any logins from unknown VPNs, residential proxies, and infrastructure providers. All of these are standard features of the same products we offer to customers.</p><p>The attack also reinforced the importance of three things we’re doing well. First, requiring hard keys for access to all applications. <a href="https://krebsonsecurity.com/2018/07/google-security-keys-neutralized-employee-phishing/">Like Google</a>, we have not seen any successful phishing attacks since rolling hard keys out. Tools like Cloudflare Access made it easy to support hard keys even across legacy applications. If you’re an organization interested in how we rolled out hard keys, reach out to <a>cloudforceone-irhelp@cloudflare.com</a> and our security team would be happy to share the best practices we learned through this process.</p><p>Second, using Cloudflare’s own technology to protect our employees and systems. Cloudflare One’s solutions like Access and Gateway were critical to staying ahead of this attack. We configured our Access implementation to require hard keys for every application. It also creates a central logging location for all application authentications. And, if ever necessary, a place from which we can kill the sessions of a potentially compromised employee. Gateway allows us the ability to shut down malicious sites like this one quickly and understand what employees may have fallen for the attack. These are all functionalities that we make available to Cloudflare customers as part of our Cloudflare One suite and this attack demonstrates how effective they can be.</p><p>Third, having a paranoid but blame-free culture is critical for security. The three employees who fell for the phishing scam were not reprimanded. We’re all human and we make mistakes. It’s critically important that when we do, we report them and don’t cover them up. This incident provided another example of why security is part of every team member at Cloudflare’s job.</p>
    <div>
      <h2>Detailed Timeline of Events</h2>
      <a href="#detailed-timeline-of-events">
        
      </a>
    </div>
    <p>.tg {border-collapse:collapse;border-spacing:0;} .tg td{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px; overflow:hidden;padding:10px 5px;word-break:normal;} .tg th{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px; font-weight:normal;overflow:hidden;padding:10px 5px;word-break:normal;} .tg .tg-0lax{text-align:left;vertical-align:top}</p><p>2022-07-20 22:49 UTC</p><p>Attacker sends out 100+ SMS messages to Cloudflare employees and their families.</p><p>2022-07-20 22:50 UTC</p><p>Employees begin reporting SMS messages to Cloudflare Security team.</p><p>2022-07-20 22:52 UTC</p><p>Verify that the attacker's domain is blocked in Cloudflare Gateway for corporate devices.</p><p>2022-07-20 22:58 UTC</p><p>Warning communication sent to all employees across chat and email.</p><p>2022-07-20 22:50 UTC to2022-07-20 23:26 UTC</p><p>Monitor telemetry in the Okta System log &amp; Cloudflare Gateway HTTP logs to locate credential compromise. Clear login sessions and suspend accounts on discovery.</p><p>2022-07-20 23:26 UTC</p><p>Phishing site is taken down by the hosting provider.</p><p>2022-07-20 23:37 UTC</p><p>Reset leaked employee credentials.</p><p>2022-07-21 00:15 UTC</p><p>Deep dive into attacker infrastructure and capabilities.</p>
    <div>
      <h2>Indicators of compromise</h2>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    
<table>
<thead>
  <tr>
    <th>Value</th>
    <th>Type</th>
    <th>Context and MITRE Mapping</th>
  </tr>
</thead>
<tbody>
  <tr>
    <td>cloudflare-okta[.]com hosted on 147[.]182[.]132[.]52</td>
    <td>Phishing URL</td>
    <td><a href="https://attack.mitre.org/techniques/T1566/002/">T1566.002</a>: Phishing: Spear Phishing Link sent to users.</td>
  </tr>
  <tr>
    <td>64547b7a4a9de8af79ff0eefadde2aed10c17f9d8f9a2465c0110c848d85317a</td>
    <td>SHA-256</td>
    <td><a href="https://attack.mitre.org/techniques/T1219/">T1219</a>: Remote Access Software being distributed by the threat actor</td>
  </tr>
</tbody>
</table>
    <div>
      <h2>What You Can Do</h2>
      <a href="#what-you-can-do">
        
      </a>
    </div>
    <p>If you are seeing similar attacks in your environment, please don’t hesitate to reach out to <a>cloudforceone-irhelp@cloudflare.com</a>, and we’re happy to share best practices on how to keep your business secure. If on the other hand, you are interested in learning more about how we implemented security keys please review our <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">blog post</a> or reach out to <a>securitykeys@cloudflare.com</a>.</p><p>Finally, do you want to work on detecting and mitigating the next attacks with us? We’re hiring on our Detection and Response team, <a href="https://boards.greenhouse.io/cloudflare/jobs/4364485?gh_jid=4364485">come join us</a>!</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Post Mortem]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <guid isPermaLink="false">4NqFdSmdzCcdoVLRQ05xzx</guid>
            <dc:creator>Matthew Prince</dc:creator>
            <dc:creator>Daniel Stinson-Diess</dc:creator>
            <dc:creator>Sourov Zaman</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing browser isolation for email links to stop modern phishing threats]]></title>
            <link>https://blog.cloudflare.com/email-link-isolation/</link>
            <pubDate>Mon, 20 Jun 2022 14:02:00 GMT</pubDate>
            <description><![CDATA[ As part of our exciting journey to integrate Area 1 into our broader Zero Trust suite, Cloudflare Gateway customers can soon enable Remote Browser Isolation for email links. With Email Link Isolation, gain an unmatched level of protection from sophisticated multi-channel email-based attacks ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YQ1f5ulfZD0daYx2dAfDk/2e897fb4a2f8b01f781b2fe0e37a31c8/image6-8.png" />
            
            </figure><p>There is an implicit and unearned trust we place in our email communications. This realization — that an organization can't truly have a Zero Trust security posture without including email — was the driving force behind <a href="/why-we-are-acquiring-area-1/">Cloudflare’s acquisition of Area 1 Security</a> earlier this year.  Today, we have taken our first step in this exciting journey of integrating Cloudflare Area 1 email security into our broader Cloudflare One platform. Cloudflare Secure Web Gateway customers can soon enable <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI)</a> for email links, giving them an unmatched level of protection from modern multi-channel email-based attacks.</p><p>Research from Cloudflare Area 1 found that nearly 10% of all observed malicious attacks involved credential harvesters, highlighting that victim identity is what threat actors usually seek. While commodity phishing attacks are blocked by existing security controls, modern attacks and payloads don’t have a set pattern that can reliably be matched with a block or quarantine rule. Additionally, with the growth of multi-channel phishing attacks, an effective <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a> needs the ability to detect blended campaigns spanning email and Web delivery, as well as deferred campaigns that are benign at delivery time, but weaponized at click time.</p><p>When enough “fuzzy” signals exist, isolating the destination to ensure end users are secure is the most effective solution. Now, with the integration of <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> into Cloudflare Area 1 email security, these attacks can now be easily detected and neutralized.</p>
    <div>
      <h3>Human error is human</h3>
      <a href="#human-error-is-human">
        
      </a>
    </div>
    <p>Why do humans <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7005690/">still click</a> on malicious links? It’s not because they haven’t attended enough training sessions or are not conscious about security. It’s because they have 50 unread emails in their inbox, have another Zoom meeting to get to, or are balancing a four-year old on their shoulders. They are trying their best. Anyone, <a href="https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/">including security researchers</a>, can fall for socially engineered attacks if the adversary is well-prepared.</p><p>If we accept that human error is here to stay, developing security workflows introduces new questions and goals:</p><ul><li><p>How can we reduce, rather than eliminate, the likelihood of human error?</p></li><li><p>How can we reduce the impact of human error when, not if, it happens?</p></li><li><p>How can security be embedded into an employee’s existing daily workflows?</p></li></ul><p>It’s these questions that we had in mind when we reached the conclusion that email needs to be a fundamental part of any <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>. Humans make mistakes in email just as regularly — in fact, sometimes more so — as they make mistakes surfing the Web.</p>
    <div>
      <h3>To block, or not to block?</h3>
      <a href="#to-block-or-not-to-block">
        
      </a>
    </div>
    <p>For IT teams, that is the question they wrestle with daily to balance risk mitigation with user productivity. The <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/">SOC</a> team wants IT to block everything risky or unknown, whereas the business unit wants IT to allow everything not explicitly bad. If IT decides to block risky or unknown links, and it results in a false positive, they waste time manually adding URLs to allow lists — and perhaps the attacker later pivots those URLs to malicious content anyway. If IT decides to allow risky or unknown sites, best case they waste time reimaging infected devices and resetting login credentials — but all too common, they triage the damage from a data breach or <a href="/targeted-ransomware-attack/">ransomware</a> lockdown. The operational simplicity of enabling RBI with email — also known as email link isolation — saves the IT, SOC, and business unit teams significant time.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>For a Cloudflare Area 1 customer, the initial steps involve enabling RBI within your portal:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DB66MqCc1WgkzVLqbgB0q/27ac7d5a7619a8992949742e89ac50bb/image5-8.png" />
            
            </figure><p>With email link isolation in place, here’s the short-lived life of an email with suspicious links:</p><p><b>Step 1:</b> Cloudflare Area 1 inspects the email and determines that certain links in the messages are suspicious or on the margin</p><p><b>Step 2:</b> Suspicious URLs and hyperlinks in the email get rewritten to a custom Cloudflare Area 1 prefix URL.</p><p><b>Step 3:</b> The email is delivered to the intended inboxes.</p><p><b>Step 4:</b> If a user clicks the link in the email, Cloudflare redirects to a remote browser via <code>&lt;authdomain&gt;.cloudflareaccess.com/browser/{{url}}</code>.</p><p><b>Step 5:</b> Remote browser loads a website on a server on the Cloudflare Global Network and serves draw commands to the user's clientless browser endpoint**.**</p><p>By executing the browser code and controlling user interactions on a remote server rather than a user device, any and all malware and phishing attempts are isolated, and won't infect devices and compromise user identities. This improves both user and endpoint security when there are unknown risks and unmanaged devices, and allows users to access websites without having to connect to a VPN or having strict firewall policies.</p><p>Cloudflare’s RBI technology uses a unique patented technology called <a href="/cloudflare-and-remote-browser-isolation/">Network Vector Rendering (NVR)</a> that utilizes headless Chromium-based browsers in the cloud, transparently intercepts draw layer output, transmits the draw commands efficiency and securely over the web, and redraws them in the windows of local HTML5 browsers. Unlike legacy Browser Isolation technologies that relied on pixel pushing or DOM reconstruction, NVR is optimized for scalability, security and end user transparency, while ensuring the broadest compatibility with websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QDHEc1rlX53Z5kc2k0tob/dab1e12b7103cfca3623ac75965dc599/image1-11.png" />
            
            </figure>
    <div>
      <h3>A phishing attack before email link isolation</h3>
      <a href="#a-phishing-attack-before-email-link-isolation">
        
      </a>
    </div>
    <p>Let’s look at a specific example of a deferred phishing attack, how it slips past traditional defenses, and how email link isolation addresses the threat.</p><p>As organizations look to adopt new security principles and network architectures like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, adversaries continually come up with techniques to bypass these controls by exploiting the most used and most vulnerable application – email. Email is a good candidate for compromise because of its ubiquity and ability to be bypassed pretty easily by a motivated attacker.</p><p>Let’s take an example of a “deferred phishing attack”, without email link isolation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2c21s9A2FUgNs7mjZOInav/b99ae23100048308c28b534bc49a4dfb/image4-9.png" />
            
            </figure><p><b>Attacker preparation: weeks before launch</b>The attacker sets up infrastructure for the phishing attempt to come. This may include:</p><ul><li><p>Registering a domain</p></li><li><p>Encrypting it with SSL</p></li><li><p>Setting up proper email authentication (<a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC)</a></p></li><li><p>Creating a benign web page</p></li></ul><p>At this point, there is no evidence of an attack that can be picked up by secure email gateways, authentication-based solutions, or threat intelligence that relies solely on reputation-based signals and other deterministic detection techniques.</p><p><b>Attack “launch”: Sunday afternoon</b>The attacker sends an authentic-looking email from the newly-created domain. This email includes a link to the (still benign) webpage. There’s nothing in the email to block or flag it as suspicious. The email gets delivered to intended inboxes.</p><p><b>Attack launch: Sunday evening</b>Once the attacker is sure that all emails have reached their destination, they pivot the link to a malicious destination by changing the attacker-controlled webpage, perhaps by creating a fake login page to harvest credentials.</p><p><b>Attack landing: Monday morning</b>As employees scan their inboxes to begin their week, they see the email. Maybe not all of them click the link, but some of them do. Maybe not all of those that clicked enter their credentials, but a handful do. Without email link isolation, the attack is successful.</p><p>The consequences of the attack have also just begun – once user login credentials are obtained, attackers can <a href="https://www.crn.com/news/security/solarwinds-ceo-confirms-office-365-email-compromise-played-role-in-broad-based-attack">compromise legitimate accounts</a>, distribute malware to your organization’s network, steal confidential information, and cause much more downstream damage.</p>
    <div>
      <h3>A phishing attack after email link isolation</h3>
      <a href="#a-phishing-attack-after-email-link-isolation">
        
      </a>
    </div>
    <p>The integration between Cloudflare Area 1 and Cloudflare Browser Isolation provides a critical layer of post-delivery protection that can foil attacks like the deferred phishing example described above.</p><p>If the attacker prepares for and executes the attack as stated in the previous section, our email link isolation would analyze the email link at the time of click and perform a high-level assessment on whether the user should be able to navigate to it.</p><p><b>Safe link</b> - Users will be redirected to this site transparently</p><p><b>Malicious link</b> - Users are blocked from navigating</p><p><b>Suspicious link</b> - Users are heavily discouraged to navigating and are presented with a splash warning page encouraging them to view in the link in an isolated browser</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WinnctxUCvAnCPJsM45BE/45d9fda72b702eb51d0f39683b4b3408/image3-14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CAGmRXrUrW6Le2iX3yLjH/3a4889d9b6c627a9f4bd94a1a4c78361/image2-15.png" />
            
            </figure><p>While a splash warning page was the mitigation employed in the above example, email link isolation will also offer security administrators other customizable mitigation options as well, including putting the webpage in read-only mode, restricting the download and upload of files, and disabling keyboard input altogether within their Cloudflare Gateway consoles.</p><p>Email link isolation also fits into users’ existing workflows without impacting productivity or sapping their time with IT tickets. Because Cloudflare Browser Isolation is built and deployed on the Cloudflare network, with global locations in 270 cities, web browsing sessions are served as close to users as possible, minimizing latency. Additionally, Cloudflare Browser Isolation sends the final output of each webpage to a user instead of page scrubbing or sending a pixel stream, further reducing latency and not breaking browser-based applications such as SaaS.</p>
    <div>
      <h3>How do I get started?</h3>
      <a href="#how-do-i-get-started">
        
      </a>
    </div>
    <p>Existing Cloudflare Area 1 and Cloudflare Gateway customers are eligible for the beta release of email link isolation. To learn more and to express interest, <a href="http://www.cloudflare.com/zero-trust/lp/email-link-isolation">sign up for our upcoming beta</a>.</p><p>If you’d like to see what threats Cloudflare Area 1 detects on your live email traffic, request a free phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>. It takes five minutes to get started and does not impact mail flow.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">22Vv0Qr11T3jQcQy2q08TS</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Tarika Srinivasan</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to replace your email gateway with Cloudflare Area 1]]></title>
            <link>https://blog.cloudflare.com/replace-your-email-gateway-with-area-1/</link>
            <pubDate>Mon, 20 Jun 2022 13:14:55 GMT</pubDate>
            <description><![CDATA[ Traditional SEG architectures were built for the email environments of yesterday. Learn how to seamlessly transition to cloud-native, preemptive email security ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Leaders and practitioners responsible for <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> are faced with a few truths every day. It’s likely true that their email is cloud-delivered and comes with some built-in protection that does an OK job of stopping spam and commodity malware. It’s likely true that they have spent considerable time, money, and staffing on their Secure Email Gateway (SEG) to stop phishing, malware, and other email-borne threats. Despite this, it’s also true that email continues to be the most frequent source of Internet threats, with Deloitte research finding that 91% of all cyber attacks begin with phishing.</p><p>If anti-phishing and SEG services have both been around for so long, why do so many phish still get through? If you’re sympathetic to <a href="https://en.wikipedia.org/wiki/Occam's_razor">Occam’s razor</a>, it’s because the SEG was not designed to protect the email environments of today, nor is it effective at reliably stopping today’s phishing attacks.</p><p>But if you need a stronger case than Occam delivers — then keep on reading.</p>
    <div>
      <h3>Why the world has moved past the SEG</h3>
      <a href="#why-the-world-has-moved-past-the-seg">
        
      </a>
    </div>
    <p>The most prominent change within the email market is also what makes a traditional SEG redundant – the move to cloud-native email services. More than 85% of organizations are expected to embrace a “cloud-first” strategy by 2025, <a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences">according to Gartner</a>®. Organizations that expect cloud-native scale, resiliency, and flexibility from their security controls are not going to get it from legacy devices such as SEGs.</p><p>When it comes to email specifically, <a href="https://www.gartner.com/document/4006566">Gartner® notes</a> that, “Advanced email security capabilities are increasingly being deployed as integrated cloud email security solutions rather than as a gateway” - with at least 40% of organizations using built-in protection capabilities from cloud email providers instead of a SEG, by 2023. Today, email comes from everywhere and goes everywhere – putting a SEG in front of your Exchange server is anachronistic; and putting a SEG in front of cloud inboxes in a mobile and remote-first world is intractable. <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">Email security</a> today should follow your user, should be close to your inbox, and should “be everywhere”.</p><p>Apart from being architecturally out of time, a SEG also falls short at detecting advanced phishing and socially engineered attacks. This is because a SEG was originally designed to stop spam – a high-volume problem that needs large attack samples to detect and nullify. But today’s phishing attacks are more sniper than scattergun. They are low volume, highly targeted, and exploit our implicit trust in email communications to steal money and data. Detecting modern phishing attacks requires compute-intensive advanced email analysis and threat detection algorithms that a SEG cannot perform at scale.</p><p>Nowhere is a SEG’s outdated detection philosophy more laid bare than when admins are confronted with a mountain of email threat policies to create and tune. Unlike most other cyber attacks, email phishing and <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise (BEC)</a> have too many “fuzzy” signals and cannot solely be detected by deterministic if-then statements. Moreover, attackers don’t stand still while you create email threat policies – they adapt fast and modify techniques to bypass the rules you just created. Relying on SEG tuning to stop phishing is like playing a game of Whack-A-Mole rigged in the attacker’s favor.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SK0PsBM13jyobYcZF25fg/3d9efeb49a1df1a1d49c316692f283a8/image1-12.png" />
            
            </figure>
    <div>
      <h3>To stop phishing, look ahead</h3>
      <a href="#to-stop-phishing-look-ahead">
        
      </a>
    </div>
    <p>Traditional email security defenses rely on knowledge of yesterday’s active attack characteristics, such as reputation data and threat signatures, to detect the next attack, and therefore can’t reliably defend against modern phishing attacks that continually evolve.</p><p>What’s needed is forward-looking security technology that is aware not only of yesterday’s active phishing payloads, websites, and techniques — but also has insight into the threat actors’ next moves. Which sites and accounts are they compromising or establishing for use in tomorrow’s attacks? What payloads and techniques are they preparing to use in those attacks? Where are they prodding and probing before an attack?</p><p>Cloudflare Area 1 proactively scans the Internet for attacker infrastructure and phishing campaigns that are under construction. Area 1’s threat-focused web crawlers dynamically analyze suspicious web pages and payloads, and continuously update detection models as attacker tactics evolve – all to stop phishing attacks days before they reach the inbox.</p><p>When combined with the 1T+ daily DNS requests observed by <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>, this corpus of threat intelligence enables customers to stop phishing threats at the earliest stage of the attack cycle. In addition, the use of deep contextual analytics to understand message sentiment, tone, tenor and thread variations allows Area 1 to understand and distinguish between valid business process messages and sophisticated impersonation campaigns.</p><p>While we are big believers in layering security, the layers should not be redundant. A SEG duplicates a lot of capabilities that customers now get bundled in with their cloud email offering. Area 1 is built to enhance - not duplicate - native email security and stop phishing attacks that get past initial layers of defense.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wa98Zw9glRlVzhd2Ehdaz/0974a784a8561c9d49e2b519b89403f1/image4-10.png" />
            
            </figure>
    <div>
      <h3>Planning for your SEG replacement project</h3>
      <a href="#planning-for-your-seg-replacement-project">
        
      </a>
    </div>
    <p>The best way to get started with your SEG replacement project is deciding whether it’s a straight replacement or an eventual replacement that starts with augmentation. While Cloudflare Area 1 has plenty of customers that have replaced their SEG (more on that later), we have also seen scenarios where customers prefer to run Cloudflare Area 1 downstream of their SEG initially, assess the efficacy of both services, and then make a more final determination. We make the process straightforward either way!</p><p>As you start the project, it’s important to involve the right stakeholders. At a minimum, you should involve an IT admin to ensure email delivery and productivity isn’t impacted and a security admin to monitor detection efficacy. Other stakeholders might include your channel partner if that’s your preferred procurement process and someone from the privacy and compliance team to verify proper handling of data.</p><p>Next, you should decide your preferred Cloudflare Area 1 deployment architecture. Cloudflare Area 1 can be deployed as the MX record, over APIs, and can even run in multi-mode deployment. We recommend deploying Cloudflare Area 1 as the MX record for the most effective <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protection against external threats</a>, but the service fits into your world based on your business logic and specific needs.</p><p>The final piece of preparation involves mapping out your email flow. If you have multiple domains, identify where emails from each of your domains route to. Check your different routing layers (e.g. are there MTAs that relay inbound messages?). Having a good understanding of the logical and physical SMTP layers within the organization will ensure proper routing of messages. Discuss what email traffic Cloudflare Area 1 should scan (north/south, east/west, both) and where it fits with your existing email policies.</p>
    <div>
      <h3>Executing the transition plan</h3>
      <a href="#executing-the-transition-plan">
        
      </a>
    </div>
    <p><b>Step 1: Implement email protection</b>Here are the broad steps you should follow if Cloudflare Area 1 is configured as the MX record (time estimate: ~30 minutes):</p><ul><li><p>Configure the downstream service to accept mail from Cloudflare Area 1.</p></li><li><p>Ensure that Cloudflare Area 1’s egress IPs are not rate limited or blocked as this would affect delivery of messages.</p></li><li><p>If the email server is on-premises, update firewall rules to allow Cloudflare Area 1 to deliver to these systems.</p></li><li><p>Configure remediation rules (e.g. quarantine, add subject or message body prefix, etc.).</p></li><li><p>Test the message flow by injecting messages into Cloudflare Area 1 to confirm proper delivery. (our team can assist with this step.)</p></li><li><p>Update MX records to point to Cloudflare Area 1.</p></li></ul><p>Here are the steps if Cloudflare Area 1 is deployed downstream from an existing email security solution (time estimate: ~30 minutes):</p><ul><li><p>Configure the proper look back hops on Cloudflare Area 1, so that Cloudflare Area 1 can detect the original sender IP address.</p></li><li><p>If your email server is on-premises, update firewall rules to allow Cloudflare Area 1 to deliver to the email server.</p></li><li><p>Configure remediation rules (e.g. quarantine, add subject or message body prefix, etc.).</p></li><li><p>Test the message flow by injecting messages into Cloudflare Area 1 to confirm proper delivery. (our team can assist with this step.)</p></li><li><p>Update the delivery routes on your SEG to deliver all mail to Cloudflare Area 1, instead of the email servers.</p></li></ul><p><b>Step 2: Integrate DNS</b>One of the most common post-email steps customers follow is to integrate Cloudflare Area 1 with their DNS service. If you’re a Cloudflare Gateway customer, good news – Cloudflare Area 1 now uses Cloudflare Gateway as its <a href="https://www.cloudflare.com/learning/dns/what-is-recursive-dns/">recursive DNS</a> to protect end users from accessing phishing and malicious sites through email links or web browsing.</p><p><b>Step 3: Integrate with downstream security monitoring and remediation services</b>Cloudflare Area 1’s detailed and customizable reporting allows for at-a-glance visibility into threats. By integrating with SIEMs through our robust APIs, you can easily correlate Cloudflare Area 1 detections with events from network, endpoint and other security tools for simplified incident management.</p><p>While Cloudflare Area 1 provides built-in remediation and message retraction to allow customers to respond to threats directly within the Cloudflare Area 1 dashboard, many organizations also choose to integrate with orchestration tools for custom response playbooks. Many customers leverage our API hooks to integrate with SOAR services to manage response processes across their organization.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XVEtkicf9X4ySbz5UZyjE/9ac44ea6c8dc47c3bf6dd511dcd06a75/image2-16.png" />
            
            </figure>
    <div>
      <h3>Metrics to measure success</h3>
      <a href="#metrics-to-measure-success">
        
      </a>
    </div>
    <p>How will you know your SEG replacement project has been successful and had the desired impact? We recommend measuring metrics relevant to both detection efficacy and operational simplicity.</p><p>On the detection front, the obvious metric to measure is the number and nature of phishing attacks blocked before and after the project. Are you seeing new types of phishing attacks being blocked that you weren’t seeing before? Are you getting visibility into campaigns that hit multiple mailboxes? The other detection-based metric to keep in mind is the number of false positives.</p><p>On the operational front, it’s critical that email productivity isn’t impacted. A good proxy for this is measuring the number of IT tickets related to email delivery. The availability and uptime of the email security service is another key lever to keep an eye on.</p><p>Finally, and perhaps most importantly, measure how much time your security team is spending on email security. Hopefully it’s much less than before! A SEG is known to be a heavy-lift service deployment to ongoing maintenance. If Cloudflare Area 1 can free up your team’s time to work on other pressing security concerns, that’s as meaningful as stopping the phish themselves.</p>
    <div>
      <h3>You have lots of company</h3>
      <a href="#you-have-lots-of-company">
        
      </a>
    </div>
    <p>The reason we are articulating a SEG replacement plan here is because many of our customers have done it already and are happy with the outcomes.</p><p>For example, a Fortune 50 global insurance provider that serves 90 million customers in over 60 countries found their SEG to be insufficient in stopping phishing attacks. Specifically, it was an onerous process to search for “missed phish” once they got past the SEG and reached the inbox. They needed an <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> that could catch these phishing attacks and support a hybrid architecture with both cloud and on-premises mailboxes.</p><p>After deploying Cloudflare Area 1 downstream of their Microsoft 365 and SEG layers, our customer was protected against more than 14,000 phishing threats within the first month; none of those phishing messages reached a user’s inbox. A one-step integration with existing email infrastructure meant that maintenance and operational issues were next to none. Cloudflare Area 1’s automated message retraction and post-delivery protection also enabled the insurance provider to easily search and remediate any missed phish as well.</p><p>If you are interested in speaking with any of our customers that have augmented or replaced their SEG with Cloudflare Area 1, please reach out to your account team to learn more! If you’d like to see Cloudflare Area 1 in action, sign up for a Phishing Risk Assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p><p>Replacing a SEG is a great project to fit into your overall <a href="https://zerotrustroadmap.org/">Zero Trust roadmap</a>. For a full summary of Cloudflare One Week and what’s new, tune in to our <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3824611/the-evolution-of-cloudflare-one">recap webinar</a>.</p><p>-</p><p><sup>1</sup>Gartner Press Release, “<a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences">Gartner Says Cloud Will Be the Centerpiece of New Digital Experiences</a>”, 11 November 2021</p><p><sup>2</sup>Gartner, “Market Guide for Email Security,” 7 October 2021, Mark Harris, Peter Firstbrook, Ravisha Chugh, Mario de BoerGARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">7yjswOAjVL3CSZoC2SxJI2</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Tarika Srinivasan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Area 1 Security Announces the Most Spoofed Brand of 2021: WHO is Back Again?]]></title>
            <link>https://blog.cloudflare.com/2022-march-hackness-who-phished-brand/</link>
            <pubDate>Thu, 31 Mar 2022 12:34:00 GMT</pubDate>
            <description><![CDATA[ From Jan. 2021 to Jan. 2022, more than 8.5 million (of 56 million in total) brand phishing emails blocked by Area 1 impersonated the World Health Organization ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2022 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Dear America’s sports-loving, company-securing fans: Before you find yourself glued this weekend to (what some call) <b>THE biggest game</b> in college basketball history, we are here to crown the 2022 March Hackness winner!</p><p>Also known as: the organization most impersonated by attackers in phishing campaigns in 2021.</p><p>Despite the shiny crop of newcomers to the Top 64 impersonated organizations (which included <b>Notion.so</b>, <b>Binance</b>, and grocery stores from <b>Costco</b> to <b>Kwik Shop</b>), our March Hackness “Final Four” ended up mirroring the 2022’s NCAA Men’s Final Four: with the <a href="https://www.usatoday.com/story/sports/ncaab/2022/03/27/kansas-bill-self-fourth-final-four-winners-losers-miami/7185222001/">blue blood</a> brands, that is.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1W1YsrZ38ES3VfT9k690du/b048e2d457f4fe0b20b7b072e04cb705/March-Hackness_Final_2-1.png" />
            
            </figure><p>That’s right, folks: on the heels of passing enduring the second year of the COVID-19 pandemic, the <b>World Health Organization</b> beat out <b>Amazon, Microsoft</b> and <b>T-Mobile</b> to become the back-to-back <b>winner of Area 1’s “ophishal” March Hackness title</b>!</p><p>From Jan. 2021 to Jan. 2022, a whopping <b>15% (over 8.5 million) of the 56 million brand phishing emails</b> blocked by Area 1 impersonated the WHO.</p><p>This timeframe (not coincidentally) matches the WHO remaining top of mind for global businesses closely monitoring the rollout of new vaccines and booster shots, as well as the rise of the Delta and Omicron variants.</p>
    <div>
      <h3>There’s Always Next Year’s Tournament…</h3>
      <a href="#theres-always-next-years-tournament">
        
      </a>
    </div>
    <p>The pandemic also influenced brand phishing in other ways. The “blue blood” of online retail and the cloud — and our March Hackness runner-up — <b>Amazon</b>, was impersonated in <b>over 3.2 million phishing</b> emails blocked by Area 1.</p><p>The focus of <a href="https://www.rd.com/article/amazon-email-scam/">Amazon scams</a> vary. However, as Area 1’s principal threat researcher, Juliette Cash, explains, common ones include phishing emails claiming that accounts have been ‘placed on hold,’ payments have been declined or that Prime memberships have ‘expired.’</p><p>These types of attacks utilize Amazon branding to impersonate official emails and entice victims to click links to update their credit card information. Once the link is clicked, the user’s browser will upload malicious content and direct them to verify their identity and input their payment details.</p><p>While these messages can be sent at any time, we’ve found that they are commonly tied to events, such as Amazon Prime Day, that trigger individuals to take action in fear of missing out.</p><p>By the way, although Amazon vs. the WHO isn’t exactly the epic and storied rivalry of Duke vs. UNC, Amazon has been in our list of top 64 most impersonated brands ever since March Hackness’ inception … so, we’ll count this matchup as an important piece of cybersecurity history!</p><p>Now, we have no idea what it’s like pretending to be a Blue Devil or Tar Heel (or Jayhawk or Wildcat) for a basketball season, but we do know some things about bad actors’ impersonation tactics.</p><p><b>Identity deception</b> using tactics like spoofing, domain impersonation and display name impersonation showcase the ease at which people can deceive the user through brand phishing to gain access to their goals.</p><p>In many cases, it’s as simple as a display name change. However, there are (of course) much more complex phishing techniques that will evade standard defenses.</p><p>For example, in <a href="https://www.area1security.com/blog/pfizer-vaccine-phishing-campaign/">this 2021 vaccine phishing campaign</a> (which originally bypassed Microsoft Office 365’s native defenses before it was blocked by Area 1), attackers pretending to be the CDC:</p><ul><li><p>Used Display Name Spoofing to fake the visible FROM header</p></li><li><p>Inserted an SMTP HELO command to spoof the Envelope From domain</p></li><li><p>Chose to spoof a domain that did not have email authentication protocols configured and that no longer resolved to an IP address</p></li><li><p>Compromised a legitimate host with a benign IP, and used it to launch their phishing attack</p></li></ul><p><i>That’s</i> what you call a playbook.</p><p>And speaking of <b>Microsoft</b>, it made our “Final Four” of most-phished brands for the fourth consecutive year.</p><p>Attackers not only frequently impersonate individual Microsoft tools, they also often use Microsoft’s own tools and branding to bypass legacy defenses and email authentication. (Just one example: this credential harvesting campaign specifically leveraged Microsoft SharePoint and Microsoft Planner).</p>
    <div>
      <h3>So, How Do <i>You</i> Guard Your Inbox?</h3>
      <a href="#so-how-do-you-guard-your-inbox">
        
      </a>
    </div>
    <p>The bottom line is this: Attackers know how to deliver brand phishing campaigns with techniques that evade native email defenses, email authentication and sender reputation tools (i.e., DMARC, SPF and DKIM).</p><p>But – they’re not particularly clever or unique about whom they impersonate. As you can see from our March Hackness findings, <b>just 25 organizations were used in the majority (57%) of these phishing emails.</b></p><p>There are three main reasons brand phishing continues to reach many organizations’ inboxes, year after year:</p><ul><li><p><b>It’s easy</b> for attackers to establish <a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/">new phishing domains</a> that exploit trusted infrastructure.</p></li><li><p><b>It’s fast</b> for attackers to set up DMARC, SPF and DKIM policies for new phishing domains to reach inboxes.</p></li><li><p><b>People trust</b> emails from known organizations, business partners and internal employee accounts – accounts that they won’t identify as compromised unless they have more [advanced email security](more advanced email security in place) in place.</p></li></ul><p>You can learn more about what the common email authentication standards (SPF, DKIM and DMARC) can and cannot do when it comes to correctly verifying the origins of emails (and who they claim to be from), here.</p><p>But what does work better than email authentication for <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">preventing these kinds of phishing attacks</a>? <b>Advanced detection techniques.</b></p><p>For example, Area 1’s preemptive technology uses massive-scale web crawling to reveal emergent campaign infrastructure. Our small pattern analytics also identify phishing attack infrastructure, patterns of attack formation and threats within datasets that help us spot cyber campaigns as they’re being built.</p><p>To <b>see which brand phishing emails are landing in your organization’s inbox</b> (whether it’s from one of the March Hackness ‘players,’ or one of the 800-plus other brands hackers spoof), request a <b>free Phishing Risk Assessment</b> <a href="https://www.cloudflare.com/lp/emailsecurity/"><b>here</b></a><b>.</b></p><p>And, in the  meantime, we hope you all enjoy the last of 2022 March Madness. We know we at Area 1 will!</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Spoofing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">7zeIWQjLftRpiY3wTtnxk</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[2022 March Hackness: The Return of the Phishing Bracket - What 56 Million Emails Reveal about the Most Impersonated Brands]]></title>
            <link>https://blog.cloudflare.com/2022-march-hackness-phishing-bracket/</link>
            <pubDate>Sat, 26 Mar 2022 15:44:00 GMT</pubDate>
            <description><![CDATA[ Learn who made the list of the top brands that attackers use in phishing lures. This bracket is based on an analysis of more than 56 million phishing emails blocked by Area 1’s solution in the preceding 12 months since Feb 2022.  ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2022 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p><i>Area 1 Security’s </i><b><i>Sixth Annual March Hackness: The Perfect Phishing Bracket</i></b><i> is here!</i></p><p><i>Learn who made the list of the top brands that attackers use in phishing lures. This bracket is based on an analysis of more than 56 million phishing emails blocked by Area 1’s solution in the preceding 12 months since Feb 2022. Like with the real tournament, there are some surprising Cinderella-like newcomers, well-known MVPs, and 800-plus spoofed organizations in between — but overall, 77% of all phishing attacks exploited just the Top 64 brands in our bracket, below.</i></p><p>Well, it’s that time of the year when NCAA basketball fans find themselves bemoaning broken brackets** and pondering life’s biggest questions, such as:</p><ul><li><p>How did the Wildcat men and women both lose in the first rounds?</p></li><li><p>Was Baylor’s exit scientific proof that all good things really must come to an end?</p></li><li><p>DID ALL THAT JUST REALLY HAPPEN?!</p></li><li><p>What if the referees didn’t [insert your adjectives of choice here]?</p></li></ul><p>**A heartbroken RIP to my unsuccessful pick-to-win-it-all, Gonzaga. Goodbye, Bulldogs, we barely knew you.</p><p>Now, the Area 1 Security folks can only offer some unscientific opinions to the questions above. After all, our job is to prevent breaches, not prognosticate about bad <a href="https://www.sbnation.com/college-basketball/2022/3/19/22986648/north-carolina-vs-baylor-march-madness-refs-video-brady-manek-ejection">perfectly fine</a> officiating.</p><p>Which means that, unlike the “sometimes it’s just luck” nature of college basketball in March, we prefer to look at cold, hard data to answer threat trend questions.</p><p>And that brings us to — DRUM ROLL PLEASE — the introduction of our <b>Sixth Annual March Hackness: The Perfect Phishing Bracket!</b></p><p>This is the time of year we conclusively answer: <b>Which organizations do attackers impersonate most in phishing campaigns?</b></p><p>For 2022, our analysis is based on <b>more than 56 million phishing emails</b> that we intercepted from January 2021 – January 2022. And although attackers pretended to be <b>over 800 different organizations</b>, ultimately, just <b>64 organizations were the go-to lures in a whopping 77%</b> of these brand phishing attempts:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3r90T4rUd0iN28GKqtttps/323e8c273a16e2747df5bc1267b81b7d/image1-25.png" />
            
            </figure>
    <div>
      <h3>Breaking Down the Bracket</h3>
      <a href="#breaking-down-the-bracket">
        
      </a>
    </div>
    <p>Now, we’ll reveal soon who was MOST impersonated, but let’s break down our Top 64 (and other initial findings from the overall data), below.</p><p>As always, attackers continued to take advantage of the following two, basic concepts when it comes to brand phishing campaigns (which, PS: easily evade DMARC and other email authentication standards):</p><p><b>1) Which technologies do people use most?</b>In Area 1’s first-ever March Hackness, we found hackers often exploited “traditional” banks and financial institutions, and loved to spoof the likes of AOL, Yahoo!, and Craigslist. But that was in 2016, when AOL’s AIM was still around (!!), before Facebook Marketplace launched as ‘the new’ Craigslist … and before something mysterious called Crypto.com rebranded the Staples Center.</p><p>Flash forward to today, and:</p><ul><li><p>In a sign of the times, and acknowledgement of how much <b>‘the Cloud’</b> is a part of all of our lives**, more than 22%** of brand phishing attacks exploited commonly <b>cloud services</b>, such as <b>Amazon, Box, DocuSign, Google, Intuit, Microsoft</b> and many others.</p></li><li><p>But, it isn’t just well-entrenched cloud companies on the list: <a href="https://www.theverge.com/2021/1/5/22215782/tiktok-notion-enterprise-software-teen-studyblr">viral-because-of-TikTok</a> <b>Notion.so,</b> the productivity tool that’s won over high schoolers and The Wall Street Journal, appeared for the first time in our Top 64!</p></li><li><p>Hackers are seeing dollar signs in cryptocurrency: <b>Binance</b> is a March Hackness newcomer (perhaps the Saint Peter’s of surprising suspect emails??!) this year. And although they didn’t crack the Top 64, <b>Coinbase</b>, <b>Metamask</b>, <b>Kraken</b>, <b>Gemini</b> and multiple crypto exchanges were also spoofed in thousands of phishing emails.</p></li><li><p>By the way, <b>Bitcoin</b>, which doesn’t technically qualify as an organization for our bracket, still deserves its own special shot-out: hackers referenced Bitcoin in <b>over 600,000</b> phishing emails last year. Actually, let’s just assume now that <a href="https://www.protocol.com/bulletins/circle-blockfi-pantera-hacked?">the crypto phishing trend</a> has only one direction to go.</p></li></ul><p><b>2) Which brands do people trust?</b>Attackers know users are more inclined to open and click messages from organizations that they interact with, whether it’s for information, work or play.</p><p>In addition to leveraging the <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">hybrid/remote workforce</a> trend to phish users using popular cloud services, attackers also pretended to be:</p><ul><li><p><b>Healthcare &amp; Social Services:</b> With the Covid pandemic lingering on yet another year, the <b>World Health Organization</b> (last year’s “ophishal champion”) and Humana both reappear in the top 64. Area 1 also blocked thousands of phishing emails pretending to be from organizations like <b>UNICEF</b> and the <b>Centers for Medicare &amp; Medicaid Services</b> … proving that hackers are more than willing to exploit society’s most vulnerable.</p></li><li><p><b>Grocery Stores/Food &amp; Beverage Retailers:</b> Like <a href="https://www.supermarketnews.com/online-retail/online-channel-builds-share-us-grocery-market-2021">70% of U.S. households</a> last year, my family did a LOT of online grocery shopping. In fact, over half of all shoppers (51%) <a href="https://progressivegrocer.com/new-digital-grocery-shopper">started online grocery shopping</a> after the pandemic began — and our data shows bad actors have also been happy to jump onto this bandwagon shopping cart. Area 1 intercepted millions of phishing emails spoofing grocers of all sizes, across all regions: from <b>Fred Meyer</b> to <b>Amazon Fresh</b>, to <b>Kwik Shop</b> to <b>Costco</b>, and many, many more.  [Insert bad pun about ordering ‘fish’, not ‘phish,’ here].</p></li></ul>
    <div>
      <h3>Who Will Cut Down the (Phishing) Nets?</h3>
      <a href="#who-will-cut-down-the-phishing-nets">
        
      </a>
    </div>
    <p>We’ll reveal the March Hackness champion — the No. 1 brand used for phishing (the organization used in a whopping <b>15% of the overall attacks</b>) — soon!</p><p>And, in the meantime, you might be wondering: “Why should I care? My organization has email authentication and other tools to block emails from fake senders!”</p><p>Well (unless you’re using Area 1), chances are good that brand phishing is still fouling up your organization’s inboxes.</p><p>Email authentication standards (i.e., SPF, DKIM and DMARC) can serve useful security functions such as validating server and tenant origins, protecting message integrity, and providing policy enforcement.</p><p>However, email authentication is <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3955867/how-bad-actors-get-past-dmarc-in-60-minutes-or-less">largely ineffective</a> against brand phishing (especially when in the form of payload-less Business Email Compromise).</p><p>We’ll dive deeper into the reasons why, after we unveil the winner of the 2022 March Hackness: The Phishing Tournament. Stay tuned here.</p><p>PS: We can’t promise our findings will be less stressful than the NCAA championship game on April 4th. But, they should be more useful than wondering what “<a href="https://www.si.com/extra-mustard/2022/03/20/only-one-perfect-march-madness-bracket-remains">GO VOLS! GBO!</a>” is like in real life.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">3FfQgyG9AErA8zhbOfAfse</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Democratizing email security: protecting individuals and businesses of all sizes from phishing and malware attacks]]></title>
            <link>https://blog.cloudflare.com/democratizing-email-security/</link>
            <pubDate>Mon, 14 Mar 2022 12:59:33 GMT</pubDate>
            <description><![CDATA[ Once the acquisition of Area 1 closes, we plan to give all paid self-serve plans access to their email security technology at no additional charge ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5t6mGqXJD9qlJOdDYKgFW4/062c99b0769b5c30eb07e056c53a87cd/image1-10.png" />
            
            </figure><p>Since our founding, Cloudflare has been on a mission to take expensive, complex security solutions typically only available to the largest companies and make them easy to use and accessible to everyone. In 2011 and 2015 we did this for the <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">web application firewall</a> and SSL/TLS markets, simplifying the process of protecting websites from application vulnerabilities and encrypting HTTP requests down to single clicks; in 2020, during the start of the COVID-19 pandemic, we made our Zero Trust suite available to everyone; and today—in the face of heightened phishing attacks—we’re doing the same for the email security market.</p><p>Once the acquisition of Area 1 closes, as we expect early in the second quarter of 2022, we plan to give all paid self-serve plans access to their <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security technology</a> at no additional charge. Control, customization, and visibility via analytics will vary with plan level, and the highest flexibility and support levels will be available to Enterprise customers for purchase.</p><p>All self-serve users will also get access to a more feature-packed version of the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust solution</a> we made available to everyone in 2020. Zero Trust services are incomplete without an <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a>, and <a href="https://www.cisa.gov/news/2021/10/01/cisa-kicks-cybersecurity-awareness-month">CISA’s recent report</a> makes that clearer than ever: over 90% of successful cyber attacks start with a phishing email, so we expect that over time analysts will have no choice but to include email in their definitions of secure access and zero edges.</p><p><b>If you’re interested in reserving your place in line, register your interest by logging into your Cloudflare account at dash.cloudflare.com, selecting your domain, clicking Email, and then “Join Waitlist” at the top of the page; we’ll reach out after the Area 1 acquisition is completed, and the integration is ready, in the order we received your request.</b></p>
    <div>
      <h3>One-click deployment</h3>
      <a href="#one-click-deployment">
        
      </a>
    </div>
    <p>If you’re already managing your authoritative DNS with Cloudflare, as nearly 100% of <a href="https://www.cloudflare.com/plans/">non-Enterprise plans</a> are, there will just be a single click to get started. Once clicked, we’ll start returning different MX records to anyone trying to send email to your domain. This change will attract all emails destined for your domain, during which they’ll be run through Area 1’s models and potentially be quarantined or flagged. Customers of Microsoft Office 365 will also be able to take advantage of APIs for an even deeper integration and capabilities like post-delivery message redaction.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CbqzMF8kBl1AP1z62smRo/54807cd4dcf81335a7f0471d01fc67be/image2-10.png" />
            
            </figure><p>In addition to routing and filtering email, we’ll also automagically take care of your DNS email security records such as SPF, DKIM, DMARC, etc. We launched a tool to help with this last year, and soon we’ll be making it even more comprehensive and easier to use.</p>
    <div>
      <h3>Integration with other Zero Trust products</h3>
      <a href="#integration-with-other-zero-trust-products">
        
      </a>
    </div>
    <p>As we wrote in the <a href="/why-we-are-acquiring-area-1/">acquisition announcement post</a> on this blog, we’re excited to integrate email security with other products in our Zero Trust suite. For customers of Gateway and Remote Browser Isolation (RBI), we’ll automatically route potentially suspicious domains and links through these protective layers. Our built-in <a href="/data-loss-prevention/">data loss prevention (DLP) technology</a> will also be wired into Area 1’s technology in deployments where visibility into outbound email is available.</p>
    <div>
      <h3>Improving threat intelligence with new data sources</h3>
      <a href="#improving-threat-intelligence-with-new-data-sources">
        
      </a>
    </div>
    <p>In addition to integrating directly with Zero Trust products, we’re excited about connecting threat data sources from Area 1 into existing Cloudflare products and vice versa. For example, phishing infrastructure identified during Area 1’s Internet-wide scans will be displayed within the recently launched Cloudflare Security Center, and 1.1.1.1’s trillions of queries per month will help Area 1 identify new domains that may be threats. Domains that are newly registered, or registered with slight variations of legitimate domains, are often warning signs of an upcoming phishing attack.</p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>Cloudflare has been a happy customer of Area 1’s technology for years, and we’re excited to open it up to all of our customers as soon as possible. If you’re excited as we are about being able to use this in your Pro or Business plan, reserve your place in line today within the Email tab for your domain. Or if you’re an Enterprise customer and want to get started immediately, fill out <a href="https://www.cloudflare.com/lp/emailsecurity/">this form</a> or contact your Customer Success Manager.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">3FxihkQRtKc61pl0Sevyjt</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
    </channel>
</rss>