Sunday, January 18, 2026

Cybercriminals Exploit Cloudflare Tunnels to Deploy Covert Python Malware

In a recent surge of cyberattacks, threat actors are abusing Cloudflare’s legitimate tunneling service to deliver stealthy malware, according to a detailed report from Securonix threat researchers.

The campaign, dubbed SERPENTINE#CLOUD, employs a multi-stage infection chain initiated by malicious shortcut files (.lnk) masquerading as harmless PDF documents.

Designed to evade detection by both users and security tools, this campaign targets victims in Western countries, especially the United States, the United Kingdom, and Germany, but has also been observed in other regions across Europe and Asia.

Screenshots of hosted content by the attacker from within a browser

The attack begins with phishing emails featuring supposed invoices or payment confirmations. Recipients are prompted to open ZIP files containing .lnk files that appear as PDFs a social engineering ruse aided by custom icons and Windows operating quirks that hide file extensions even when enabled.

Once executed, the .lnk file leverages legitimate Windows utilities like cmd.exe and robocopy to download and execute the next stage payload from a remote WebDAV share hosted on a Cloudflare Tunnel subdomain, such as “flour-riding-merit-refers.trycloudflare[.]com.”

Cloudflare Tunnels provide a crucial layer of obfuscation and anonymity for attackers, allowing them to expose malicious payloads through temporary subdomains without the need to register domains or rent dedicated servers.

This trusted infrastructure makes it less likely for network monitoring tools to flag suspicious activity, as traffic blends in with legitimate Cloudflare CDN communications.

The use of HTTPS and WebDAV over SSL further complicates detection by encrypting payload delivery and evading deep packet inspection tools.

Multi-Stage Scripting and Obfuscation Techniques Shroud Malicious Intent

Following initial access, the attack progresses through several carefully orchestrated stages.

After the .lnk file fetches a malicious Windows Script File (WSF), a lightweight VBScript-based loader executes, retrieving and launching an obfuscated batch file from another Cloudflare subdomain.

The batch script employs complex encoding and variable substitution techniques to mask its true purpose, making static analysis challenging.

The main payload delivery script, often named something like “kiki.bat,” performs a range of evasive and persistence actions.

It deploys a decoy PDF to distract users, checks for antivirus software, and downloads compressed Python payloads into the victim’s Contacts or Print directories.

The script establishes persistence by placing VBS and additional batch files in the Windows startup folder, ensuring the malware re-executes after system reboots.

Python Shellcode Loaders and In-Memory Exploitation Mark Final Stage

The campaign’s most sophisticated phase utilizes Python-based shellcode loaders. These scripts obfuscated using advanced techniques such as alphanumeric shift encoding, bytewise shifting with randomized keys, and custom newline replacement, are designed to decrypt and execute RC4-encrypted shellcode entirely in memory.

One notable loader, “run.py,” implements Early Bird APC injection: it launches an innocent process (e.g., notepad.exe) in a suspended state, injects decrypted shellcode, and resumes execution, all while maintaining stealth and evading detection by endpoint protection systems.

Ultimately, the shellcode loads a Donut-packed PE (Portable Executable) payload, a framework for executing .NET assemblies entirely in memory without requiring disk access.

This approach not only complicates forensic analysis but also enables the threat actors to establish persistent command-and-control (C2) channels for credential theft, data exfiltration, and lateral movement.

Defensive Recommendations

Experts strongly advise organizations to bolster their defenses by enabling file extension visibility on Windows endpoints, monitoring for script activity in unusual directories (such as Contacts), and scrutinizing Python processes launched from atypical locations.

Robust endpoint logging and solutions like Sysmon can help detect multistage scripting attacks and anomalous process trees. Securonix has also released specific hunting queries to help organizations identify indicators of compromise related to this campaign.

This complex, layered attack exemplifies the evolving tactics of cybercriminals, blending social engineering with advanced obfuscation and abuse of legitimate infrastructure for maximum stealth and impact.

Analyzed files/hashes

File NameSHA256
Online-wire-confirmation-receipt846752.zip193218243C54D7903C65F5E7BE9B865DDB286DA9005C69E6E955E31EC3EFA1A7
Online-wire-confirmation-receipt75857.zip3B97A79ED920A508B4CD91240D0795713C559C36862C75EC6C9A41B4EC05D279
wire-confirmation-55281762.url32253D3EA50927D0FD79F5BFDD6EE93C46AA26126CE4360D9915FABD2E5F562F
Emban.zip81C47E749E8A3376294DE8593C2387A0642080303BB17D902BABFF1DE561E743
bab.zip017FD2003F8EAA65FF85131322F5FAEC1E338511788328438020848EDF3DFD8D
22DE5FFC9BFFE49C4713113AC171B95E016ED0F09065BFEE1394A579174E8DD6
E78FF6F51A3FAECF4D20CD5B71B2396B7C2FEC74AF19122B1E1EEE432C13B773  
cam.zip100970B2EB83E3A80CB463126845619A05C979D235B07ECA4B1C2027772334EC
63FFC2B66E32111CD5BE311AD499BD15DA5D28EDC05B7F3DA43DFE77F3E2C7F8
F6B403D719D770FFB6CC310E2F97889998224A563A1A629BE5B7F8642B5F00BA
FTSP.zip0484DE293F2C125132CAA585229A8702AF00CB645AA27684C2EE6F9F4F3EDB6F

Recent News

Recent News