top of page

Cloudflare Human Check Exploited by Hackers to Conceal Microsoft 365 Phishing Sites

  • Mar 13
  • 2 min read

Key Findings


* Attackers are exploiting Cloudflare's human verification system to hide phishing pages


* Custom virtual machine function used to obfuscate malicious code


* Targets Microsoft 365 login credentials


* Employs sophisticated evasion techniques against security scanners


* Uses location-based filtering to block security researchers


Background


Cybercriminals have developed an innovative method of hiding phishing websites by leveraging Cloudflare's Turnstile verification system. This approach allows attackers to create more resilient and difficult-to-detect malicious sites targeting Microsoft 365 users. The technique represents a significant evolution in phishing infrastructure design, turning a security mechanism into a protective shield for malicious activities.


Technical Mechanics


The attack uses a multi-layered approach to avoid detection:


* Implements a Cloudflare Turnstile verification checkpoint


* Checks visitor location using api.ipify.org


* Maintains a blocklist of known security researchers and organizations


* Automatically redirects suspected security scanners to a blank page or legitimate website


* Uses a custom virtual machine function (e_d007dc) to scramble malicious code


Infrastructure Characteristics


* Primarily uses Namecheap for domain registration


* Utilizes mail servers like jellyfish.systems


* Identified static 'sitekey' (0x4AAAAAACG6TJhrsuZdpjsN) across multiple domains


* Targets Microsoft 365 login credentials


Evasion Techniques


The phishing infrastructure includes sophisticated evasion mechanisms:


* Blocks access from known security IP ranges


* Dynamically changes page content based on visitor characteristics


* Uses obfuscated code to bypass standard antivirus detection


* Implements location-based filtering


Mitigation Recommendations


* Verify website URLs carefully before entering credentials


* Use multi-factor authentication


* Be suspicious of sites requiring immediate human verification


* Keep security software updated


* Train users to recognize sophisticated phishing attempts


Potential Impact


* High risk of credential theft


* Potential for widespread Microsoft 365 account compromises


* Advanced social engineering technique


* Demonstrates evolving threat actor capabilities


Sources


  • https://hackread.com/hackers-cloudflare-human-check-microsoft-365-phishing/

  • https://www.socdefenders.ai/item/457c5f28-a390-426c-9d0d-2cd77841da55

  • https://x.com/HackRead/status/2032143425252757920

  • https://www.youtube.com/watch?v=AEEdruckH2c

  • https://www.reddit.com/r/InfoSecNews/comments/1rrwqp1/hackers_use_cloudflare_human_check_to_hide/

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page