In a recent surge of cyberattacks, threat actors are abusing Cloudflare’s legitimate tunneling service to deliver stealthy malware, according to a detailed report from Securonix threat researchers.
The campaign, dubbed SERPENTINE#CLOUD, employs a multi-stage infection chain initiated by malicious shortcut files (.lnk) masquerading as harmless PDF documents.
Designed to evade detection by both users and security tools, this campaign targets victims in Western countries, especially the United States, the United Kingdom, and Germany, but has also been observed in other regions across Europe and Asia.

The attack begins with phishing emails featuring supposed invoices or payment confirmations. Recipients are prompted to open ZIP files containing .lnk files that appear as PDFs a social engineering ruse aided by custom icons and Windows operating quirks that hide file extensions even when enabled.
Once executed, the .lnk file leverages legitimate Windows utilities like cmd.exe and robocopy to download and execute the next stage payload from a remote WebDAV share hosted on a Cloudflare Tunnel subdomain, such as “flour-riding-merit-refers.trycloudflare[.]com.”
Cloudflare Tunnels provide a crucial layer of obfuscation and anonymity for attackers, allowing them to expose malicious payloads through temporary subdomains without the need to register domains or rent dedicated servers.
This trusted infrastructure makes it less likely for network monitoring tools to flag suspicious activity, as traffic blends in with legitimate Cloudflare CDN communications.
The use of HTTPS and WebDAV over SSL further complicates detection by encrypting payload delivery and evading deep packet inspection tools.
Multi-Stage Scripting and Obfuscation Techniques Shroud Malicious Intent
Following initial access, the attack progresses through several carefully orchestrated stages.
After the .lnk file fetches a malicious Windows Script File (WSF), a lightweight VBScript-based loader executes, retrieving and launching an obfuscated batch file from another Cloudflare subdomain.
The batch script employs complex encoding and variable substitution techniques to mask its true purpose, making static analysis challenging.
The main payload delivery script, often named something like “kiki.bat,” performs a range of evasive and persistence actions.
It deploys a decoy PDF to distract users, checks for antivirus software, and downloads compressed Python payloads into the victim’s Contacts or Print directories.
The script establishes persistence by placing VBS and additional batch files in the Windows startup folder, ensuring the malware re-executes after system reboots.
Python Shellcode Loaders and In-Memory Exploitation Mark Final Stage
The campaign’s most sophisticated phase utilizes Python-based shellcode loaders. These scripts obfuscated using advanced techniques such as alphanumeric shift encoding, bytewise shifting with randomized keys, and custom newline replacement, are designed to decrypt and execute RC4-encrypted shellcode entirely in memory.
One notable loader, “run.py,” implements Early Bird APC injection: it launches an innocent process (e.g., notepad.exe) in a suspended state, injects decrypted shellcode, and resumes execution, all while maintaining stealth and evading detection by endpoint protection systems.
Ultimately, the shellcode loads a Donut-packed PE (Portable Executable) payload, a framework for executing .NET assemblies entirely in memory without requiring disk access.
This approach not only complicates forensic analysis but also enables the threat actors to establish persistent command-and-control (C2) channels for credential theft, data exfiltration, and lateral movement.
Defensive Recommendations
Experts strongly advise organizations to bolster their defenses by enabling file extension visibility on Windows endpoints, monitoring for script activity in unusual directories (such as Contacts), and scrutinizing Python processes launched from atypical locations.
Robust endpoint logging and solutions like Sysmon can help detect multistage scripting attacks and anomalous process trees. Securonix has also released specific hunting queries to help organizations identify indicators of compromise related to this campaign.
This complex, layered attack exemplifies the evolving tactics of cybercriminals, blending social engineering with advanced obfuscation and abuse of legitimate infrastructure for maximum stealth and impact.
Analyzed files/hashes
| File Name | SHA256 |
| Online-wire-confirmation-receipt846752.zip | 193218243C54D7903C65F5E7BE9B865DDB286DA9005C69E6E955E31EC3EFA1A7 |
| Online-wire-confirmation-receipt75857.zip | 3B97A79ED920A508B4CD91240D0795713C559C36862C75EC6C9A41B4EC05D279 |
| wire-confirmation-55281762.url | 32253D3EA50927D0FD79F5BFDD6EE93C46AA26126CE4360D9915FABD2E5F562F |
| Emban.zip | 81C47E749E8A3376294DE8593C2387A0642080303BB17D902BABFF1DE561E743 |
| bab.zip | 017FD2003F8EAA65FF85131322F5FAEC1E338511788328438020848EDF3DFD8D 22DE5FFC9BFFE49C4713113AC171B95E016ED0F09065BFEE1394A579174E8DD6 E78FF6F51A3FAECF4D20CD5B71B2396B7C2FEC74AF19122B1E1EEE432C13B773 |
| cam.zip | 100970B2EB83E3A80CB463126845619A05C979D235B07ECA4B1C2027772334EC 63FFC2B66E32111CD5BE311AD499BD15DA5D28EDC05B7F3DA43DFE77F3E2C7F8 F6B403D719D770FFB6CC310E2F97889998224A563A1A629BE5B7F8642B5F00BA |
| FTSP.zip | 0484DE293F2C125132CAA585229A8702AF00CB645AA27684C2EE6F9F4F3EDB6F |





