Categories: Cyber Security News

Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits

Threat actors are increasingly using trusted cloud and content delivery network platforms to host phishing kits, creating major detection challenges for security teams.

Unlike traditional phishing campaigns that rely on newly registered suspicious domains, these attacks use legitimate infrastructure from providers like Google, Microsoft Azure, and AWS CloudFront.

Sponsored

This approach allows hackers to bypass many security filters because the domains appear trustworthy at first glance.

The shift toward cloud-based phishing infrastructure represents a concerning evolution in social engineering attacks.

Victims encounter familiar domain names from well-known technology companies, making them more likely to enter sensitive credentials.

Network monitoring tools also struggle to flag these activities since they see ordinary HTML content loading from established cloud services rather than suspicious traffic patterns.

This technique specifically targets enterprise users in several campaigns, filtering out free email accounts to focus on corporate credentials.

Any.Run researchers identified this growing pattern while analyzing multiple phishing kit families. The analysis revealed that Tycoon phishing kit operates from Microsoft Azure Blob Storage, specifically using the domain alencure[.]blob[.]core[.]windows[.]net.

https://twitter.com/anyrun_app/status/2011756689024815184?ref_src=twsrc%5Etfw

Sneaky2FA phishing kit was found on Firebase Cloud Storage at firebasestorage[.]googleapis[.]com and AWS CloudFront at cloudfront[.]net, using fake Microsoft 365 login pages to harvest corporate account credentials.

EvilProxy phishing kit leverages Google Sites at sites[.]google[.]com to host its malicious pages.

Detection and Response Challenges

Security teams face unique obstacles when dealing with cloud-hosted phishing infrastructure.

Sponsored

Traditional domain reputation checks fail because the hosting platforms themselves are legitimate services used by countless organizations for valid purposes.

Most security vendors classify these cloud domains as safe, which is technically accurate. The malicious activity exists in the content being served, not the infrastructure itself.

The solution requires behavioral analysis rather than simple domain checks. Security platforms need to examine how users interact with these cloud-hosted pages and identify suspicious patterns in real-time.

Any.Run Sandbox demonstrates this capability by exposing these threats in under 60 seconds, reducing both mean time to detect and mean time to respond.

Organizations should implement threat intelligence lookups that specifically search for abuse patterns on Microsoft Azure Blob Storage, Firebase Cloud Storage, and Google Sites platforms.

Related indicators of compromise include mphdvh[.]icu, kamitore[.]com, aircosspascual[.]com, and Lustefea[.]my[.]id.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Hackers Abusing Legitimate Cloud and CDN Platforms to Host Phishing Kits appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Google API Keys Expose Private Data Silently Through Gemini

A critical privilege escalation vulnerability affecting Google Cloud API keys specifically how legacy public-facing keys…

1 hour ago

Kilmar Abrego Garcia prosecutor testifies criminal charges were not ‘vindictive’

Kilmar Abrego Garcia arriving at a downtown Nashville courthouse with his wife, Jennifer Vasquez Sura,…

1 hour ago

Democrats push back against Trump anti-DEI funding cuts for minority-serving colleges

The University of Nevada, Las Vegas, is among the nation's largest Hispanic-serving institutions.(Photo by Hugh…

1 hour ago

The Pitt Season 2, Episode 8: “2:00 PM” Review

Warning: This review contains full spoilers for The Pitt Season 2, Episode 8!One of the…

2 hours ago

Phishing‑Led Agent Tesla Campaign Uses Process Hollowing and Anti‑Analysis to Evade Detection

A newly uncovered phishing campaign is delivering Agent Tesla, one of the most widely used…

4 hours ago

Governor Shapiro Doubles Down on Opposition to ICE Detention Centers Proposed in Pennsylvania After Visit With Berks and Schuylkill County Leaders

The Trump Administration’s purchase of two vacant warehouses in two rural Pennsylvania townships illustrates where…

4 hours ago

This website uses cookies.