Cloudflare Tunnels is an apparently safe service that creates trusted local networks Internet connections, and recently it has become more popular among hackers and their activities are hidden. Through this service, the attackers can create temporary encrypted channels through Cloudflare’s infrastructure and hence, make it very difficult to track their activities through conventional security measures.
These tunnels also help in transferring the payload such as the remote access trojans (RATs), ransomware, and others. Most of these threats provide the attacker continuous access to the compromised systems and the data and the attackers can easily conduct spying, and other malicious actions. This is due to the unpredictability of the Cloudflare Tunnels and to its flexibility of creating multiple tunnels at the same time.
The ease of installing and using Cloudflare tunnels is one of the reasons why hackers have adopted the software. Even the amateur hackers can quickly set up these tunnels and deploy further evil intents within a short time span. It is a popular choice for criminals looking to evade detection due to the service’s inherent ability to conceal malicious activities. Despite an attempt to neutralize abuse at the company, the trends in the work of cybercriminals are growing more sophisticated, and for that reason, the fight between Cloudflare and the villains never ends.
To counter and eliminate this threat, organizations need to deploy a multilayered security model that will incorporate threat detection, protection of the endpoints, and user training programs. Also, it is necessary to be aware of new threats and trends to prevent the further use of Cloudflare Tunnel for malicious actions.