{"id":14885,"date":"2026-05-18T09:56:07","date_gmt":"2026-05-18T09:56:07","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14885"},"modified":"2026-05-18T09:56:07","modified_gmt":"2026-05-18T09:56:07","slug":"hackers-abuse-cloudflare-storage-to-exfiltrate-community-recordsdata","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14885","title":{"rendered":"Hackers Abuse Cloudflare Storage to Exfiltrate Community Recordsdata"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A complicated cyber espionage marketing campaign concentrating on a number of Malaysian organizations has been uncovered, revealing a extremely structured assault chain that blends {custom} tooling, cloud infrastructure, and stealthy information exfiltration. <\/p>\n<p>On the middle of the operation is an Azure digital machine (IP: 20.17.161.118) used to orchestrate assaults throughout government-linked networks. <\/p>\n<p>The infrastructure contained a variety of attacker instruments, together with tailor-made Python scripts, Laravel exploit chains, webshell deployment utilities, and even supply code for beforehand undisclosed command-and-control (C2) elements.<\/p>\n<p>The attackers demonstrated robust operational self-discipline by growing purpose-built Python scripts for every goal and performance. These instruments dealt with inside community enumeration, database entry, and information staging earlier than exfiltration.<\/p>\n<p>For instance, scripts resembling analyze_[REDACTED].py leveraged administrator-level WinRM entry and embedded MSSQL credentials to run PowerShell queries immediately in opposition to inside databases. <\/p>\n<p>Safety researchers at Oasis Safety <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/oasis-security.io\/blog\/malaysian-government-with-undisclosed-c2-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">recognized attacker-controlled infrastructure<\/a> hosted on Microsoft Azure within the Malaysia West area, signaling a deliberate effort to function near focused environments whereas minimizing detection.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"743\" height=\"421\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144554.png\" alt=\"analyze_[REDACTED].py \u2014 embedded MSSQL credentials and direct database access against an internal server (Source : OASIS).\" class=\"wp-image-186493\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144554.png 743w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144554-300x170.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144554-741x421.png 741w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144554-150x85.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144554-696x394.png 696w\" sizes=\"(max-width: 743px) 100vw, 743px\"\/><figcaption class=\"wp-element-caption\">\u00a0<code>analyze_[REDACTED].py<\/code>\u00a0\u2014 embedded MSSQL credentials and direct database entry in opposition to an inside server (Supply : OASIS).<\/figcaption><\/figure>\n<\/div>\n<p>Others, like asset_owner_check.py, ready delicate datasets by validating integrity and compressing information for extraction. Extra scripts focused particular information varieties, together with picture data saved in databases.<\/p>\n<p>A separate toolkit was designed for external-facing authorities portals. One script exploited an uncovered RPC. <\/p>\n<p>ASP endpoint to execute distant Home windows instructions through HTTP POST requests, enabling attackers to run code with out direct system interplay. <\/p>\n<p>The usage of a password listing containing 126 focused credentials additional highlights the precision of the marketing campaign.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-hackers-abuse-cloudflare-storage\"><strong>Hackers Abuse Cloudflare Storage<\/strong><\/h2>\n<p>A notable side of this intrusion is the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/cloudflare-full-technical-explanation-of-internet-outage\/\" type=\"post\" id=\"169435\" target=\"_blank\" rel=\"noreferrer noopener\">use of Cloudflare-hosted storage<\/a> for information exfiltration. The script gen_photo_upload.py was particularly designed to add stolen information from compromised methods to attacker-controlled Cloudflare endpoints.<\/p>\n<p>One of many scripts,\u00a0<code>h[REDACTED]_alt_creds.py<\/code>, interacts with an uncovered rpc.asp endpoint to execute distant Home windows instructions through WScript.Shell object creation.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"756\" height=\"415\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144912.png\" alt=\"h[REDACTED]_alt_creds.py remote command execution via exposed rpc.asp endpoint (Source : OASIS).\" class=\"wp-image-186496\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144912.png 756w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144912-300x165.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144912-150x82.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-144912-696x382.png 696w\" sizes=\"auto, (max-width: 756px) 100vw, 756px\"\/><figcaption class=\"wp-element-caption\"><code>h[REDACTED]_alt_creds.py<\/code>\u00a0distant command execution through uncovered rpc.asp endpoint (Supply : OASIS).<\/figcaption><\/figure>\n<\/div>\n<p>This strategy gives a number of benefits:<\/p>\n<ul class=\"wp-block-list\">\n<li>Blends malicious visitors with legit cloud providers.<\/li>\n<li>Reduces the probability of detection by conventional safety instruments.<\/li>\n<li>Permits dependable and scalable information switch \u062e\u0627\u0631\u062c the sufferer community.<\/li>\n<\/ul>\n<p>In parallel, a separate script (deploy.py) enabled distant command execution through exterior RPC endpoints, permitting attackers to keep up management with out persistent interactive periods.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"759\" height=\"326\" src=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-145156.png\" alt=\"deploy.py external RPC endpoint configuration enabling remote command execution (Source : OASIS).\" class=\"wp-image-186498\" srcset=\"https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-145156.png 759w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-145156-300x129.png 300w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-145156-150x64.png 150w, https:\/\/gbhackers.com\/wp-content\/uploads\/2026\/05\/Screenshot-2026-05-18-145156-696x299.png 696w\" sizes=\"auto, (max-width: 759px) 100vw, 759px\"\/><figcaption class=\"wp-element-caption\"><code>deploy.py<\/code>\u00a0exterior RPC endpoint configuration enabling distant command execution (Supply : OASIS).<\/figcaption><\/figure>\n<\/div>\n<p>The marketing campaign escalated to full area compromise in at the least one case. Researchers found exfiltrated Home windows registry hive information (SAM, SECURITY, SYSTEM) and NTDS dumps from a website controller. <\/p>\n<p>These artifacts enable attackers to extract password hashes and delicate credentials offline utilizing instruments like Mimikatz.<\/p>\n<p>This degree of entry allows:<\/p>\n<ul class=\"wp-block-list\">\n<li>Lengthy-term persistence throughout the community.<\/li>\n<li>Lateral motion between methods.<\/li>\n<li>Potential re-entry even after partial remediation.<\/li>\n<\/ul>\n<p>Moreover, attackers deployed a PHP webshell (well being.php) on a government-associated server, which remained lively on the time of research, offering ongoing distant entry.<\/p>\n<p>The attackers additionally exploited a Malaysian cellular operator\u2019s platform utilizing a chained Laravel distant code execution method. <\/p>\n<p>The exploit mixed 5 deserialization gadget chains, utilizing encrypted payloads suitable with Laravel\u2019s framework to execute system instructions.<\/p>\n<p>Past exploitation, researchers uncovered supply code for a personal C2 framework, together with:<\/p>\n<ul class=\"wp-block-list\">\n<li>A C# beacon (beacon.cs) used for persistence and communication.<\/li>\n<li>A Python-based HTTP listener (listener_http.py) to handle contaminated hosts.<\/li>\n<\/ul>\n<p>These instruments will not be publicly out there, indicating a well-resourced menace actor working past typical commodity malware campaigns.<\/p>\n<p>This marketing campaign stands out attributable to its structured, modular design and reliance on custom-built tooling. <\/p>\n<p>The confirmed <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/gbhackers.com\/active-directory-management-tools\/\" type=\"post\" id=\"99224\" target=\"_blank\" rel=\"noreferrer noopener\">extraction of Lively Listing credentials<\/a>, use of cloud providers for stealthy exfiltration, and presence of lively webshells point out a mature and chronic menace.<\/p>\n<p>Organizations going through comparable threats ought to prioritize speedy containment actions, together with eradicating webshells, rotating area credentials, and conducting deep forensic evaluation to establish lingering attacker entry.<\/p>\n<p>The mix of Azure-hosted infrastructure, Cloudflare-based exfiltration, and personal C2 tooling highlights an evolving menace panorama the place attackers more and more mix into trusted cloud ecosystems to evade detection.<\/p>\n<p class=\"has-text-align-center has-background\" style=\"background:linear-gradient(135deg,rgb(238,238,238) 100%,rgb(169,184,195) 100%)\"><strong>Observe us on\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/news.google.com\/publications\/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2RpYUdGamEyVnljeTVqYjIwb0FBUAE?hl=en-IN&amp;gl=IN&amp;ceid=IN%3Aen\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google Information<\/a>,\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/cyber-threat-intel\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LinkedIn<\/a>, and\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/The_Cyber_News\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>\u00a0to Get On the spot Updates and Set GBH as a Most popular Supply in\u00a0<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.google.com\/preferences\/source?q=https:\/\/gbhackers.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Google<\/a>.<\/strong><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>A complicated cyber espionage marketing campaign concentrating on a number of Malaysian organizations has been uncovered, revealing a extremely structured assault chain that blends {custom} tooling, cloud infrastructure, and stealthy information exfiltration. On the middle of the operation is an Azure digital machine (IP: 20.17.161.118) used to orchestrate assaults throughout government-linked networks. The infrastructure contained [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14887,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1865,6309,9117,129,554,299,2041],"class_list":["post-14885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-abuse","tag-cloudflare","tag-exfiltrate","tag-files","tag-hackers","tag-network","tag-storage"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14885"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14885\/revisions"}],"predecessor-version":[{"id":14886,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14885\/revisions\/14886"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14887"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-18 11:35:51 UTC -->