{"id":4665,"date":"2025-06-18T17:14:43","date_gmt":"2025-06-18T17:14:43","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/18\/new-malware-campaign-uses-cloudflare-tunnels-to-deliver-rats-via-phishing-chains\/"},"modified":"2025-06-18T17:14:43","modified_gmt":"2025-06-18T17:14:43","slug":"new-malware-campaign-uses-cloudflare-tunnels-to-deliver-rats-via-phishing-chains","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/18\/new-malware-campaign-uses-cloudflare-tunnels-to-deliver-rats-via-phishing-chains\/","title":{"rendered":"New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains"},"content":{"rendered":"<p>\u200bA new campaign is making use of Cloudflare Tunnel subdomains to host malicious payloads and deliver them via malicious attachments embedded in phishing emails.<br \/>\nThe ongoing campaign has been codenamed SERPENTINE#CLOUD by Securonix.<br \/>\nIt leverages &#8220;the Cloudflare Tunnel infrastructure and Python-based loaders to deliver memory-injected payloads through a chain of shortcut files and obfuscated\u00a0A new campaign is making use of Cloudflare Tunnel subdomains to host malicious payloads and deliver them via malicious attachments embedded in phishing emails.<br \/>\nThe ongoing campaign has been codenamed SERPENTINE#CLOUD by Securonix.<br \/>\nIt leverages &#8220;the Cloudflare Tunnel infrastructure and Python-based loaders to deliver memory-injected payloads through a chain of shortcut files and obfuscated\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bA new campaign is making use of Cloudflare Tunnel subdomains to host malicious payloads and deliver them via malicious attachments embedded in phishing emails. The ongoing campaign has been codenamed SERPENTINE#CLOUD by Securonix. It leverages &#8220;the Cloudflare Tunnel infrastructure and Python-based loaders to deliver memory-injected payloads through a chain of shortcut files and obfuscated\u00a0A new&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/06\/18\/new-malware-campaign-uses-cloudflare-tunnels-to-deliver-rats-via-phishing-chains\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4666,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4665"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4665"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4665\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4666"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}