
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 07 Apr 2026 21:05:59 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Evolving Cloudflare’s Threat Intelligence Platform: actionable, scalable, and ETL-less]]></title>
            <link>https://blog.cloudflare.com/cloudflare-threat-intelligence-platform/</link>
            <pubDate>Tue, 03 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ Stop managing ETL pipelines and start threat hunting. Introducing new visualization, automation, and enrichment tools in the Cloudflare Threat Intelligence Platform to turn massive telemetry into instant security posture.  ]]></description>
            <content:encoded><![CDATA[ <p>For years, the cybersecurity industry has suffered from a "data gravity" problem. Security teams are buried under billions of rows of telemetry, yet they remain starved for actionable insights. </p><p>A Threat Intelligence Platform (TIP) is a centralized security system that collects, aggregates, and organizes data about known and emerging cyber threats. It serves as the vital connective tissue between raw telemetry and active defense.</p><p>The underlying architecture of Cloudflare’s Threat Intelligence Platform sets it apart from other solutions. We have evolved our <a href="https://www.cloudflare.com/cloudforce-one/services/threat-intelligence/"><u>Threat Intelligence Platform</u></a> to eliminate the need for complex ETL (Extract, Transform, Load) pipelines by using a sharded, SQLite-backed architecture. By running GraphQL directly on the edge, security teams can now visualize and automate threat response in real time. Instead of one massive database, we distribute Threat Events across thousands of logical shards — meaning sub-second query latency, even when aggregating millions of events across global datasets.</p><p>By unifying our global telemetry with the manual investigations performed by our analysts, our intelligence platform creates a single source of truth that allows security teams to move from observing a threat to preemptively blocking it across the Cloudflare network. We believe your intelligence platform shouldn't just tell you that something is "bad"; it should tell you why it’s happening, who is behind it, and automatically prevent it from happening again. </p><p>In this post, we’ll explore some of the features that make the Cloudforce One experience powerful and effective.</p>
    <div>
      <h2>Why are we launching a Threat Intelligence Platform?</h2>
      <a href="#why-are-we-launching-a-threat-intelligence-platform">
        
      </a>
    </div>
    <p>When we announced the <a href="https://blog.cloudflare.com/introducing-cloudforce-one-threat-operations-and-threat-research/"><u>Cloudforce One team</u></a> in 2022, we quickly realized that tracking adversary infrastructure required tools that didn't yet exist. So we built our own.</p><p>What began as an internal project has evolved into a cloud-first, agentic-capable Threat Intelligence Platform (TIP) designed for our users. We have moved from conceptualizing <a href="https://blog.cloudflare.com/threat-events-platform/"><u>"observable" events</u></a> across various datasets to building a platform that maps the entire lifecycle of a threat. Today, the Cloudflare TIP allows you to correlate actors to malware, link cases to indicators, and store everything in one unified ecosystem.</p><p>We are moving beyond simple data access to provide a fully integrated, visual, and automated command center for your SOC. Our motivation behind building this TIP stems from the core tenets of effective threat intelligence: relevance, accuracy, and actionability. We needed a highly extensible system that can integrate multiple datasets, support multi-tenancy, enable group-based and tenant-to-tenant sharing, and scale efficiently on the edge. </p><p>By using <a href="https://workers.cloudflare.com/"><u>Cloudflare Workers</u></a>, we’ve built a next-generation developer stack that ensures rapid innovation. We can now synthesize millions of threat events into real-time graphs and diagrams and instantly answer the critical questions: What happened? And what does it mean? </p><p>Because our <a href="https://developers.cloudflare.com/analytics/graphql-api/"><u>GraphQL</u></a> endpoint is built in the same Worker that is driving the Threat Events platform, your data is always live and there are no delays between ingestion and availability. Whether you are applying complex analysis or drilling down into a specific event, the platform responds instantly. As Workers runtime evolves, our TIP inherits these optimizations automatically. For example, <a href="https://developers.cloudflare.com/pages/functions/smart-placement/"><u>Smart Placement</u></a> ensures our query-handling Workers are physically located near the Durable Objects they are fanning out to, minimizing tail latency. And the ability to use larger CPU limits and <a href="https://developers.cloudflare.com/hyperdrive/"><u>Hyperdrive</u></a> allows us to maintain higher performance connection pooling directly at the edge, rather than backhauling the logic to a single datacenter.</p>
    <div>
      <h3>Beyond the SIEM: historical context and intelligence enrichment</h3>
      <a href="#beyond-the-siem-historical-context-and-intelligence-enrichment">
        
      </a>
    </div>
    <p>While a SIEM (Security Information and Event Management) is designed for real-time log aggregation and immediate alerting, it often lacks the specialized schema and long-term retention needed for deep adversary tracking. Our TIP fills this gap by acting as a dedicated intelligence layer that enriches raw logs with historical actor patterns. The goal of our platform isn’t to replace a SIEM, but to complement it. Our TIP provides the long-term, structured storage for Threat Events — retained and indexed at the edge — needed to bridge the gap between technical telemetry and executive insight.</p><p>The <a href="https://www.cloudflare.com/soc-as-a-service/"><u>Cloudflare Managed Defense</u></a> and Threat Intelligence Platform are designed to operate in a symbiotic loop, creating a powerful force multiplier for threat detection and response. By integrating the TIP directly with the SOC, analysts gain immediate, rich context for any alert or event. Instead of just seeing an anomalous IP address or a suspicious file hash, the SOC team can instantly see its history, its association with known threat actors, its role in broader campaigns, and its risk score as determined by the TIP's analytics. This immediate context eliminates time-consuming manual research and enables faster, more accurate decision-making.</p><p>Conversely, as the intel analyst team investigates incidents and hunts for new threats, their findings become a crucial source of new intelligence. </p><p>Newly discovered indicators of compromise (IOCs) are fed back into the TIP, enriching the platform for all users and enhancing its automated defenses. This continuous feedback loop ensures the intelligence is always current and grounded in real-world observations, providing unparalleled visibility into the threat landscape and allowing security teams to shift from a reactive to a proactive defense posture.</p>
    <div>
      <h3>An architecture that eliminates bottlenecks</h3>
      <a href="#an-architecture-that-eliminates-bottlenecks">
        
      </a>
    </div>
    <p>To ensure every piece of Cloudforce One telemetry is actionable, we had to solve a fundamental storage problem: how do you provide low-latency, complex queries over billions of events without the overhead of a traditional centralized database?</p><p>We chose a sharded architecture built on <a href="https://developers.cloudflare.com/durable-objects/api/sqlite-storage-api/"><u>SQLite backed Durable Objects</u></a>. By distributing Threat Events across this high-cardinality fleet of storage units, we ensure that no single database becomes a point of contention during high-volume ingestion. Each shard is a Durable Object, providing a consistent, transactional interface to its own private SQLite database.</p><p>This architecture allows us to use the full Cloudflare developer stack. We use Cloudflare Queues to ingest and distribute incoming telemetry asynchronously, ensuring that high-volume attack spikes don't saturate our write throughput. Once ingested, data is stored in R2 for long-term retention, while the "hot" index remains in the Durable Object's SQLite storage for instant retrieval.</p>
    <div>
      <h4>Parallel execution at the edge</h4>
      <a href="#parallel-execution-at-the-edge">
        
      </a>
    </div>
    <p>The real power of this approach is visible during a search. When a user queries our GraphQL endpoint — which also runs in a Worker — the platform doesn't query a single table. Instead, it fans out the request to multiple Durable Objects in parallel. Because Durable Objects are distributed across our global network, we can aggregate results with minimal latency. After we verify the user’s permissions and eliminate the shards that would not contain our events (by date), here is a simplified look at how the Worker handles a multi-shard fan-out:</p>
            <pre><code>// A conceptual look at fanning out a query to multiple shards
async function fetchFromShards(shards, query) {
  const promises = shards.map(shardId =&gt; {
    const stub = TELEMETRY_DO.get(shardId);
    return stub.querySQLite(query); // Calling the DO's storage method
  });

  // Parallel execution across the Cloudflare network
  const results = await Promise.all(promises);
  return results.flat();
}
</code></pre>
            <p>This parallelism ensures a fluid experience whether you are auditing a single dataset for a year of history or synthesizing a month of activity across every dataset in your account. By moving the compute — the SQL execution — to where the data lives, we eliminate the bottleneck of a single, monolithic database.</p>
    <div>
      <h4>Visualize the Adversary with dynamic graphs and diagrams</h4>
      <a href="#visualize-the-adversary-with-dynamic-graphs-and-diagrams">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4n601oScdNL1BuQWIXGxXE/606035f846d159ac426d1dcb7d76d8de/diagrams.png" />
          </figure><p>Numbers on a spreadsheet don't tell stories; patterns do. We’ve introduced dynamic visualizations to help you "see" the threat landscape.</p><ul><li><p>Sankey Diagrams to trace the flow of attacks from origin to target, identifying which regions are being hit hardest and where the infrastructure resides.</p></li><li><p>Industry and dataset distribution of attacks, for users to instantly pivot your view to see if a specific campaign is targeting your sector (e.g., Finance or Retail) or if it's a broad-spectrum commodity attack.</p></li></ul>
    <div>
      <h4>Correlating telemetry through attribute mapping</h4>
      <a href="#correlating-telemetry-through-attribute-mapping">
        
      </a>
    </div>
    <p>A single indicator, such as an IP address, provides limited utility without historical and relational context. We have structured our Threat Insights to act as a pivot point, allowing you to correlate disparate threat events across multiple datasets into a single, cohesive campaign or exploit.</p><p>Instead of manual cross-referencing, the platform automatically maps our internal actor nomenclature to recognized industry aliases — such as linking our internal tracking to "Fancy Bear" or "APT28." This ensures that your local environment's telemetry is instantly interoperable with broader global research and threat intelligence feeds.</p>
    <div>
      <h4>Search, filters, and alerts</h4>
      <a href="#search-filters-and-alerts">
        
      </a>
    </div>
    <p>Saved configurations and real-time notifications help you get notified the second our telemetry matches your custom filters, allowing you to react at the speed of the edge. Effective threat hunting requires the ability to filter global telemetry by specific technical attributes. The platform supports high-cardinality searches across our entire dataset — including IP addresses, file hashes, domains, and JA3 fingerprints — with results typically returned in seconds.</p><p>To move beyond manual searching, you can persist these query parameters as saved configurations. These configurations act as triggers for our real-time notification engine; when new incoming telemetry matches your defined filters, the platform pushes an alert to your configured endpoints. This transition from pull-based searching to push-based alerting ensures that your security stack can respond to matches as soon as they are ingested by our global network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27O9rmFhi0p71TPxRvu0Di/a5472f838c3f64d2d3cdab4b1f08ad86/BLOG-2921_3.png" />
          </figure>
    <div>
      <h4>Automated rules and STIX2 Exports</h4>
      <a href="#automated-rules-and-stix2-exports">
        
      </a>
    </div>
    <p>Intelligence is only "actionable" if it results in a reduced attack surface. We’ve built the TIP to handle the translation between raw telemetry and security enforcement automatically.</p><p>For organizations using third-party or in-house SIEM or SOAR platforms, interoperability is a requirement. However, mapping disparate internal data schemas to the <a href="https://developers.cloudflare.com/changelog/2026-01-12-stix2-available-for-threat-events-api/"><u>STIX2</u></a> (Structured Threat Information eXpression) standard is traditionally a high-latency ETL task. We’ve moved this translation to the edge. </p><p>When a user requests a STIX2 export, a Worker dynamically maps our internal SQLite records to the STIX2 JSON schema. This means we are first converting raw IP addresses, file hashes, and domain names into standardized STIX cyber observables. Then we define relationship objects using our platform's internal mapping to link <code>indicator</code> objects to <code>threat-actor</code> or <code>malware</code> objects, preserving the context of the investigation. Finally, we automatically manage the <code>modified</code> and <code>created</code> timestamps in UTC to ensure your downstream tools can track the evolution of the threat.</p>
    <div>
      <h4>Instant Protection via the Firewall API</h4>
      <a href="#instant-protection-via-the-firewall-api">
        
      </a>
    </div>
    <p>Beyond exports, the platform allows you to close the loop between discovery and defense. When you identify a malicious pattern in a Sankey diagram or a specific Actor campaign, you can generate a security rule with one click.</p><p>Under the hood, the TIP interacts directly with the Cloudflare Firewall Rules API. It takes the filtered attributes of your investigation (e.g., a specific JA3 fingerprint combined with a list of known malicious ASNs) and compiles them into a wire-protocol rule that is deployed across our global network in seconds.</p>
    <div>
      <h3>Human-in-the-loop intelligence</h3>
      <a href="#human-in-the-loop-intelligence">
        
      </a>
    </div>
    <p>While automation handles the bulk of telemetry, the most complex threats require human intuition. We’ve integrated a <a href="https://developers.cloudflare.com/security-center/cloudforce-one/#submit-rfis"><u>Requests for Information (RFI) Portal</u></a> directly into the platform, allowing users to task Cloudforce One analysts with deep-dive investigations.</p><p>From a technical perspective, the RFI system isn't just a ticketing portal; it's a data-enrichment pipeline. When a subscriber uses a number of "tokens" to initiate a request, the workflow triggers a series of events:</p><ul><li><p>The RFI Worker pulls the specific Threat Event IDs related to the query from the sharded SQLite storage, packaging the relevant telemetry for the analyst</p></li><li><p>Cloudforce One analysts use an internal version of the TIP to perform reverse engineering or pivot across global datasets</p></li><li><p>Once the investigation is complete, the findings (new IOCs, actor attributions, or campaign notes) are written back into our global intelligence feed</p></li></ul><p>This ensures that the "human" insight doesn't just sit in a PDF report. Instead, the resulting metadata is pushed back to the edge as a threat event where relevant, where it can be used by the WAF or Firewall rules you’ve already configured. We’ve moved from a static "report" model to a dynamic "intel-as-code" model, where human analysis directly improves the platform's automated detection logic in real time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vh9cYdhF27UvDpKQH73rf/c743be430d1c1a7feb2fa9eb603320b2/BLOG-2921_4.png" />
          </figure>
    <div>
      <h2>From data management to active hunting</h2>
      <a href="#from-data-management-to-active-hunting">
        
      </a>
    </div>
    <p>The shift from managing ETL pipelines to active threat hunting isn't just about a new interface but about where the compute happens. By moving the storage, aggregation, and visualization layers to the Cloudflare global network, we’ve removed the "data gravity" that typically slows down a SOC. Defenders no longer need to wait for logs to sync to a central repository before they can ask, "Is this IP related to a known campaign?" The answer is now available at the edge, in the same environment where the traffic is being filtered.</p><p>To ensure this intelligence is accessible regardless of your team's size or specific requirements, we’ve structured our Cloudforce One access into three functional levels:</p><ul><li><p><i>Cloudforce One Essentials</i> allows customers to access the default datasets in threat events, search for indicators, and conduct threat hunting investigations.</p></li><li><p><i>Cloudforce One Advantage</i> allows customers to access our Threat Intelligence Analyst custom insights via requests for information.</p></li><li><p><i>Cloudforce One Elite</i>, the complete package, includes brand protection, a high number of requests for information, and access to all threat events datasets.</p></li></ul><p>The Internet moves fast, and the infrastructure used by adversaries moves even faster. By centralizing your telemetry and your response logic in one integrated platform, you can stop building pipelines and start defending your network.</p><p> [<a href="https://cloudflare.com/lp/threat-report-2026/"><u>Threat Landscape Report 2026</u></a>] [<a href="https://www.cloudflare.com/en-gb/cloudforce-one/"><u>Explore the Threat Intelligence Platform</u></a>] | [<a href="https://www.cloudflare.com/en-gb/cloudforce-one/services/threat-intelligence/"><u>Contact Sales for a Demo</u></a>]</p> ]]></content:encoded>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Threats]]></category>
            <category><![CDATA[Threat Data]]></category>
            <category><![CDATA[Digital Forensics]]></category>
            <guid isPermaLink="false">605qle9d3d8PLHdnRVGMxE</guid>
            <dc:creator>Blake Darché</dc:creator>
            <dc:creator>Alexandra Moraru</dc:creator>
            <dc:creator>Brian Seel</dc:creator>
            <dc:creator>Jacob Crisp</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing REACT: Why We Built an Elite Incident Response Team]]></title>
            <link>https://blog.cloudflare.com/introducing-react-why-we-built-an-elite-incident-response-team/</link>
            <pubDate>Thu, 09 Oct 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ We're launching Cloudforce One REACT, a team of expert security responders designed to eliminate the gap between perimeter defense and internal incident response. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudforce One’s mission is to help defend the Internet. In Q2’25 alone, Cloudflare stopped an average of 190 billion cyber threats every single day. But real-world customer experiences showed us that stopping attacks at the edge isn’t always enough. We saw ransomware disrupt financial operations, data breaches cripple real estate firms, and misconfigurations cause major data losses.</p><p>In each case, the real damage occurred <i>inside</i> networks.</p><p>These internal breaches uncovered another problem: customers had to hand off incidents to separate internal teams for investigation and remediation. Those handoffs created delays and fractured the response. The result was a gap that attackers could exploit. Critical context collected at the edge didn’t reach the teams managing cleanup, and valuable time was lost. Closing this gap has become essential, and we recognized the need to take responsibility for providing customers with a more unified defense.</p><p>Today, <a href="https://www.cloudflare.com/threat-intelligence/"><u>Cloudforce One</u></a> is launching a new suite of <a href="http://cloudflare.com/cloudforce-one/services/incident-response"><u>incident response and security services</u></a> to help organizations prepare for and respond to breaches.</p><p>These services are delivered by <b>Cloudforce One REACT (Respond, Evaluate, Assess, Consult Team)</b>, a group of seasoned responders and security veterans who investigate threats, hunt adversaries, and work closely with executive leadership to guide response and decision-making.

Customers already trust Cloudforce One to provide industry-leading <a href="https://www.cloudflare.com/cloudforce-one/research/"><u>threat intelligence</u></a>, proactively identifying and <a href="https://www.cloudflare.com/threat-intelligence/research/report/cloudflare-participates-in-global-operation-to-disrupt-raccoono365/"><u>neutralizing</u></a> the most sophisticated threats. REACT extends that partnership, bringing our expertise directly to customer environments to stop threats wherever they occur. In this post, we’ll introduce REACT, explain how it works, detail the top threats our team has observed, and show you how to engage our experts directly for support.</p><p>Our goal is simple: to provide an end-to-end<b> security partnership</b>. We want to eliminate the painful gap between defense and recovery. Now, customers can get everything from proactive preparation to decisive incident response and full recovery—all from the partner you already trust to protect your infrastructure.</p><p>It’s time to move beyond fragmented responses and into one unified, powerful defense.</p>
    <div>
      <h2>How REACT works</h2>
      <a href="#how-react-works">
        
      </a>
    </div>
    <p>REACT services consist of two main components: Security advisory services to prepare for incidents and incident response for emergency situations.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NvO487oZA6GrphFGNORGt/a49489f86f7a556dd9fcbffdf42a8b33/image5.png" />
          </figure><p><sup><i>A breakdown of the Cloudforce One incident readiness and response service offerings.</i></sup></p><p>Advisory services are designed to assess and improve an organization's security posture and readiness. These include proactive threat hunting, backed by Cloudflare’s real-time global threat intelligence, to find existing compromises, tabletop exercises to test response plans against simulated attacks, and both incident readiness and maturity assessments to identify and address systemic weaknesses.</p><p>The Incident Response component is initiated during an active security crisis. The team specializes in handling a range of complex threats, including APT and nation-state activity, ransomware, insider threats, and business email compromise. The response is also informed by Cloudflare's threat intelligence and, as a network-native service, allows responders to deploy mitigation measures directly at the Cloudflare edge for faster containment.</p><p>For organizations requiring guaranteed availability, incident response retainers are offered. These retainers provide priority response, the development of tailored playbooks, and ongoing advisory support.</p><p>Cloudflare’s REACT services are vendor-agnostic in their scope. We are making REACT available to both existing Cloudflare customers and non-customers, regardless of their current technology stack, and regardless of whether their environment is on-premise, public cloud, or hybrid.</p>
    <div>
      <h2>What makes Cloudflare's approach different?</h2>
      <a href="#what-makes-cloudflares-approach-different">
        
      </a>
    </div>
    <p>Our new service provides significant advantages over traditional incident response, where engagement and data sharing occur over separate, out-of-band channels. The integration of the service into the platform enables a more efficient and effective response to threats.</p><p>The core differentiators of this approach are:</p><ul><li><p><b>Unmatched threat visibility. </b>With roughly 20% of the web sitting behind Cloudflare's network, Cloudforce One has unique visibility into emerging attacks as they unfold globally. This lets REACT accelerate their investigations and quickly correlate incident details with emerging attack vectors and known adversary tactics.</p></li><li><p><b>Network-native mitigation.</b> The service is designed for network-native response. This allows the team, with customer authorization, to deploy mitigations directly at the Cloudflare edge, such as a <a href="https://developers.cloudflare.com/waf/custom-rules/"><u>WAF rule</u></a> or <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/"><u>Secure Web Gateway policy</u></a>. This capability reduces the time between threat identification and containment. All response actions are tracked within the dashboard for full visibility.</p></li><li><p><b>Service delivery by proven experts.</b> Cloudforce One is composed of seasoned threat researchers, consultants, and incident responders. The team has a documented history of managing complex security incidents, including nation-state activity and sophisticated financial fraud.</p></li><li><p><b>Vendor-agnostic scope.</b> While managed through the Cloudflare dashboard, the scope of the response is vendor-agnostic. The team is equipped to conduct investigations and coordinate remediation across diverse customer environments, including on-premise, public cloud, and hybrid infrastructures.</p></li></ul>
    <div>
      <h2>Key Threats Seen During Engagements So Far</h2>
      <a href="#key-threats-seen-during-engagements-so-far">
        
      </a>
    </div>
    <p>Analysis of security engagements by the REACT team over the last six months reveals three prevalent and high-impact trends. The data indicates that automated defenses, while critical, must be supplemented by specialized incident response capabilities to effectively counter these specific threats.</p>
    <div>
      <h4><b>High-impact insider threats </b></h4>
      <a href="#high-impact-insider-threats">
        
      </a>
    </div>
    <p>The REACT team has seen a significant number of incidents driven by insiders who use trusted access to bypass typical security controls. These threats are difficult to detect as they often combine technical actions with non-technical motivations. Recent scenarios observed are:</p><ul><li><p>Disgruntled or current employees using their specialized, trusted access to execute targeted, destructive attacks.</p></li><li><p>Financially motivated insiders who are compensated by external actors to exfiltrate data or compromise internal systems.</p></li><li><p>State sponsored operatives gain trusted, privileged access via fraudulent remote work roles to exfiltrate data, conduct espionage, and steal funds for illicit regime financing.</p></li></ul>
    <div>
      <h4><b>Ransomware</b></h4>
      <a href="#ransomware">
        
      </a>
    </div>
    <p>The REACT team has observed that ransomware continues to be a primary driver of high-severity incidents, posing an existential threat to nearly every sector. Common themes observed include:</p><ul><li><p>Disruption of core operations in the financial sector via hostage-taking of critical systems. </p></li><li><p>Paralysis of business functions and compromise of client data in the real estate industry, leading to significant downtime and regulatory scrutiny.</p></li><li><p>Broad impact across all industry verticals. </p></li></ul><p>Stopping these attacks demands not only robust defenses but also a well-rehearsed recovery plan that cuts time-to-restoration to hours, not weeks.</p>
    <div>
      <h4><b>Application security and supply chain breaches</b></h4>
      <a href="#application-security-and-supply-chain-breaches">
        
      </a>
    </div>
    <p>The REACT team has also seen a significant increase in incidents originating at the application layer. These threats typically manifest in two primary areas: vulnerabilities within an organization’s own custom-developed  (‘vibe coded’) applications, and security failures originating from their third-party supply chain:</p><ul><li><p>Vibe coding: The practice of providing natural language prompts to AI models to generate code can produce critical vulnerabilities which can be exploited by threat actors using techniques like remote code execution (RCE), memory corruption, and SQL injection.</p></li><li><p>SaaS supply chain risk: A compromise at a critical third-party vendor that exposes sensitive data, such as when attackers used a stolen <a href="https://blog.cloudflare.com/response-to-salesloft-drift-incident/"><u>Salesloft OAuth token</u></a> to exfiltrate customer support cases from their clients' Salesforce instances.</p></li></ul>
    <div>
      <h2>Integrated directly into your Cloudflare dashboard</h2>
      <a href="#integrated-directly-into-your-cloudflare-dashboard">
        
      </a>
    </div>
    <p>Starting today, Cloudflare Enterprise customers will find a new "Incident Response Services" tab in the Threat intelligence navigation page in the Cloudflare dashboard. This dashboard integration ensures that critical security information and the ability to engage our incident response team are always at your fingertips, streamlining the process of getting expert help when it matters most.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Imz3bhNLw4khcfHhjtvHr/b8d526964688763983b61d588d97b80f/image4.png" />
          </figure><p><sup><i>Screenshot of the Cloudforce One Incident Response Services page in the Cloudflare dashboard</i></sup></p><p>Retainer customers will benefit from a dedicated Under Attack page, which allows customers to contact Cloudforce One team during an active incident. In the event of an active incident, a simple "Request Help" button in our “Under Attack” page will immediately page our on-call incident responders to get you the help you need without delay.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4V9Gr3tYWwORVsPhOLByGr/0844aa8e4f5852ad40ead3e52bff0630/image6.png" />
          </figure><p><sup><i>Screenshot on the Under Attack button in the Cloudflare dashboard</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2KnOXewLXgkQ6c4AabrNqS/fdb6ff08ac9170391aa7e2a8e0965223/image3.png" />
          </figure><p><sup><i>Screenshot of the Emergency Incident Response page in the Cloudflare dashboard</i></sup></p><p>For proactive needs, you can also easily submit requests for security advisory services through the Cloudflare dashboard: </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4R25QIIofrdQe71aOv2pFh/40d1de44dc81cede364b76c5c0d2176a/image2.png" />
          </figure><p><sup><i>Confirmation of the successful service request submission</i></sup></p>
    <div>
      <h2>How to engage with Cloudforce One </h2>
      <a href="#how-to-engage-with-cloudforce-one">
        
      </a>
    </div>
    <p><i>To learn more about REACT, existing Enterprise customers can explore the dedicated Incident Response section in the Cloudflare dashboard. For new inquiries regarding proactive partnerships and retainers, please </i><a href="https://www.cloudflare.com/plans/enterprise/contact/"><i><u>contact Cloudflare sales</u></i></a><i>.

If you are facing an active security crisis and need the REACT team on the ground, </i><a href="https://www.cloudflare.com/under-attack-hotline/"><i><u>please contact us immediately</u></i></a><i>.</i></p> ]]></content:encoded>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[Incident Response]]></category>
            <category><![CDATA[Digital Forensics]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <guid isPermaLink="false">75gR5VwIoZW3jysVwZlES5</guid>
            <dc:creator>Chris O’Rourke</dc:creator>
            <dc:creator>Utsav Adhikari</dc:creator>
            <dc:creator>Blake Darché</dc:creator>
            <dc:creator>Jacob Crisp</dc:creator>
            <dc:creator>Trevor Lyness</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unleashing improved context for threat actor activity with our Cloudforce One threat events platform]]></title>
            <link>https://blog.cloudflare.com/threat-events-platform/</link>
            <pubDate>Tue, 18 Mar 2025 13:10:00 GMT</pubDate>
            <description><![CDATA[ Gain real-time insights with our new threat events platform. This tool empowers your cybersecurity defense with actionable intelligence to stay ahead of attacks and protect your critical assets. ]]></description>
            <content:encoded><![CDATA[ <p>Today, one of the greatest challenges that cyber defenders face is analyzing detection hits from indicator feeds, which provide metadata about specific indicators of compromise (IOCs), like IP addresses, <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASNs</u></a>, domains, URLs, and hashes. While indicator feeds have proliferated across the threat intelligence industry, most feeds contain no contextual information about why an indicator was placed on the feed. Another limitation of most feeds today is that they focus solely on blockable indicators and cannot easily accommodate more complex cases, such as a threat actor exploiting a CVE or an insider threat. Instead, this sort of complex threat intelligence is left for long form reporting. However, long-form reporting comes with its own challenges, such as the time required for writing and editing, which can lead to significant delays in releasing timely threat intelligence.</p><p>To help address these challenges, we are excited to launch our <a href="https://developers.cloudflare.com/security-center/cloudforce-one/#analyze-threat-events"><u>threat events platform</u></a> for Cloudforce One customers. Every day, Cloudflare blocks billions of cyber threats. This new platform contains contextual data about the threats we monitor and mitigate on the Cloudflare network and is designed to empower security practitioners and decision makers with actionable insights from a global perspective. </p><p>On average, we process 71 million HTTP requests per second and 44 million DNS queries per second. This volume of traffic provides us with valuable insights and a comprehensive view of current (real-time) threats. The new threat events platform leverages the insights from this traffic to offer a comprehensive, real-time view of threat activity occurring on the Internet, enabling <a href="https://www.cloudflare.com/application-services/products/cloudforceone/"><u>Cloudforce One</u></a> customers to better protect their assets and respond to emerging threats.</p>
    <div>
      <h3>How we built the threat events platform leveraging Cloudflare’s traffic insights</h3>
      <a href="#how-we-built-the-threat-events-platform-leveraging-cloudflares-traffic-insights">
        
      </a>
    </div>
    <p>The sheer volume of threat activity observed across Cloudflare’s network would overwhelm any system or SOC analyst. So instead, we curate this activity into a stream of events that include not only indicators of compromise (IOCs) but also context, making it easier to take action based on Cloudflare’s unique data. To start off, we expose events related to <a href="https://www.cloudflare.com/en-gb/ddos/"><u>denial of service</u></a> (DOS) attacks observed across our network, along with the advanced threat operations tracked by our <a href="https://www.cloudflare.com/en-gb/application-services/products/cloudforceone/"><u>Cloudforce One Intelligence team</u></a>, like the various tools, techniques, and procedures used by the threat actors we are tracking. We mapped the events to the <a href="https://attack.mitre.org/"><u>MITRE ATT&amp;CK</u></a> framework and to the <a href="https://en.wikipedia.org/wiki/Cyber_kill_chain"><u>cyber kill chain</u></a> stages. In the future, we will add events related to traffic blocked by our <a href="https://www.cloudflare.com/application-services/products/waf/"><u>Web Application Firewall</u></a> (WAF), Zero Trust <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Gateway</u></a>, Zero Trust <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Email Security</u></a> Business Email Compromise, and many other Cloudflare-proprietary datasets. Together, these events will provide our customers with a detailed view of threat activity occurring across the Internet.</p><p>Each event in our threat events summarizes specific threat activity we have observed, similar to a <a href="https://oasis-open.github.io/cti-documentation/stix/walkthrough#-sighting-object"><u>STIX2 sighting object</u></a> and provides contextual information in its summary, detailed view and via the mapping to the MITRE ATT&amp;Ck and KillChain stages. For an example entry, please see the <a href="https://developers.cloudflare.com/api/resources/cloudforce_one/subresources/threat_events/"><u>API documentation</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7GIiqbsRaSXG6G9RIeHPdQ/fe42f8c5134208b97fc2f16f33c4ee9a/image2.png" />
          </figure><p>Our goal is to empower customers to better understand the threat landscape by providing key information that allows them to investigate and address both broad and specific questions about threats targeting their organization. For example:</p><ul><li><p>Who is targeting my industry vertical?</p></li><li><p>Who is targeting my country?</p></li><li><p>What indicators can I use to block attacks targeting my verticals?</p></li><li><p>What has an adversary done across the kill chain over some period of time?</p></li></ul><p>Each event has a unique identifier that links it to the identified threat activity, enabling our Cloudforce One threat intelligence analysts to provide additional context in follow-on investigations.</p>
    <div>
      <h3>How we built the threat events platform using Cloudflare Workers</h3>
      <a href="#how-we-built-the-threat-events-platform-using-cloudflare-workers">
        
      </a>
    </div>
    <p>We chose to use the <a href="https://www.cloudflare.com/developer-platform/products/"><u>Cloudflare Developer Platform</u></a> to build out the threat events platform, as it allowed us to leverage the versatility and seamless integration of Cloudflare Workers. At its core, the platform is a Cloudflare Worker that uses <a href="https://blog.cloudflare.com/sqlite-in-durable-objects/"><u>SQLite-backed Durable Objects</u></a> to store events observed on the Cloudflare network. We opted to use Durable Objects over <a href="https://developers.cloudflare.com/d1/"><u>D1</u></a>, Cloudflare’s <a href="https://www.cloudflare.com/developer-platform/products/d1/">serverless SQL database solution</a>, because it permits us to dynamically create SQL tables to store uniquely customizable datasets. Storing datasets this way allows threat events to scale across our network, so we are resilient to surges in data that might correlate with the unpredictable nature of attacks on the Internet. It also permits us to control events by data source, share a subset of datasets with trusted partners, or restrict access to only authorized users.  Lastly, the metadata for each individual threat event is stored in the Durable Object KV so that we may store contextual data beyond our fixed, searchable fields. This data may be in the form of requests-per-second for our denial of service events, or sourcing information so Cloudforce One analysts can tie the event to the exact threat activity for further investigation.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/P2fP5IBVHYCcytcT3xI3m/f0833512bb5d12b41f350847c368e92a/image5.png" />
          </figure>
    <div>
      <h3>How to use threat events</h3>
      <a href="#how-to-use-threat-events">
        
      </a>
    </div>
    <p>Cloudforce One customers can access threat events through the Cloudflare Dashboard in <a href="https://developers.cloudflare.com/security-center/"><u>Security Center</u></a> or via the <a href="https://developers.cloudflare.com/api/resources/cloudforce_one/subresources/threat-events/"><u>Cloudforce One threat events API</u></a>. Each exposes the stream of threat activity occurring across the Internet as seen by Cloudflare, and are customizable by user-defined filters. </p><p>In the Cloudflare Dashboard, users have access to an Attacker Timelapse view, designed to answer strategic questions, as well as a more granular events table for drilling down into attack details. This approach ensures that users have the most relevant information at their fingertips.</p>
    <div>
      <h4>Events Table</h4>
      <a href="#events-table">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QiogugKXB8rGKMZ4cYaSK/506b56c7788648456f085e9fd04d975b/image1.png" />
          </figure><p><i></i><a href="https://developers.cloudflare.com/security-center/cloudforce-one/#analyze-threat-events"><u>The events table</u></a> is a detailed view in the Security Center where users can drill down into specific threat activity filtered by various criteria. It is here that users can explore specific threat events and adversary campaigns using Cloudflare’s traffic insights. Most importantly, this table will provide our users with actionable Indicators of Compromise and an event summary so that they can properly defend their services. All of the data available in our events table is equally accessible via the <a href="https://developers.cloudflare.com/security-center/cloudforce-one/#analyze-threat-events"><u>Cloudforce One threat events API</u></a>. </p><p>To showcase the power of threat events, let’s explore a real-world case:</p><p>Recently leaked chats of the <a href="https://therecord.media/black-basta-ransomware-group-chat-logs-leaked"><u>Black Basta</u></a> criminal enterprise exposed details about their victims, methods, and infrastructure purchases. Although we can’t confirm whether the leaked chats were manipulated in any way, the infrastructure discussed in the chats was simple to verify. As a result, this threat intelligence is now available as events in the threat events, along with additional unique Cloudflare context. </p><p>Analysts searching for domains, hosts, and file samples used by Black Basta can leverage the threat events to gain valuable insight into this threat actor’s operations. For example, in the threat events UI, a user can filter the “Attacker” column by selecting ‘BlackBasta’ in the dropdown, as shown in the image below. This provides a curated list of verified IP addresses, domains, and file hashes for further investigation. For more detailed information on Cloudflare’s unique visibility into Black Basta threat activity see <a href="https://www.cloudflare.com/threat-intelligence/research/report/black-bastas-blunder-exploiting-the-gangs-leaked-chats/"><u>Black Basta’s blunder: exploiting the gang’s leaked chats</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3z9ZtL3n2Ssu1iqPxDF8Fg/4283854ab4cc643b6acb71eb837c944d/image4.png" />
          </figure>
    <div>
      <h3>Why we are publishing threat events</h3>
      <a href="#why-we-are-publishing-threat-events">
        
      </a>
    </div>
    <p>Our customers face a myriad of cyber threats that can disrupt operations and compromise sensitive data. As adversaries become increasingly sophisticated, the need for timely and relevant threat intelligence has never been more critical. This is why we are introducing threat events, which provides deeper insights into these threats. </p><p>The threat events platform aims to fill this gap by offering a more detailed and contextualized view of ongoing threat activity. This feature allows analysts to self-serve and explore incidents through customizable filters, enabling them to identify patterns and respond effectively. By providing access to real-time threat data, we empower organizations to make informed decisions about their security strategies.</p><p>To validate the value of our threat events platform, we had a Fortune 20 threat intelligence team put it to the test. They conducted an analysis against 110 other sources, and we ranked as their #1 threat intelligence source. They found us "very much a unicorn" in the threat intelligence space. It’s early days, but the initial feedback confirms that our intelligence is not only unique but also delivering exceptional value to defenders.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>While Cloudforce One customers now have access to our <a href="https://developers.cloudflare.com/api/resources/cloudforce_one/subresources/threat-events/"><u>API</u></a> and <a href="https://dash.cloudflare.com/"><u>dashboard</u></a>, allowing for seamless integration of threat intelligence into their existing systems, they will also soon have access to more visualisations and analytics for the threat events in order to better understand and report back on their findings. This upcoming UI will include enhanced visualizations of attacker timelines, campaign overviews, and attack graphs, providing even deeper insights into the threats facing your organization. Moreover, we’ll add the ability to integrate with existing SIEM platforms and share indicators across systems.</p><p>Read more about the <a href="https://www.cloudflare.com/en-gb/threat-intelligence/"><u>threat intelligence research</u></a> our team publishes here or reach out to your account team about how to leverage our new threat events to enhance your cybersecurity posture. </p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[Intel]]></category>
            <category><![CDATA[Threats]]></category>
            <category><![CDATA[Context]]></category>
            <guid isPermaLink="false">2RYDbAaANKgQEHqTUgXa9V</guid>
            <dc:creator>Alexandra Moraru</dc:creator>
            <dc:creator>Blake Darché</dc:creator>
            <dc:creator>Emilia Yoffie</dc:creator>
        </item>
        <item>
            <title><![CDATA[Malicious “RedAlert - Rocket Alerts” application targets Israeli phone calls, SMS, and user information]]></title>
            <link>https://blog.cloudflare.com/malicious-redalert-rocket-alerts-application-targets-israeli-phone-calls-sms-and-user-information/</link>
            <pubDate>Sat, 14 Oct 2023 00:00:55 GMT</pubDate>
            <description><![CDATA[ On October 13, 2023, Cloudflare’s Cloudforce One Threat Operations Team became aware of a malicious Google Android application impersonating the real-time rocket alert app, Red Alert, which  provides real-time rocket alerts for Israeli citizens ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On October 13, 2023, Cloudflare’s Cloudforce One Threat Operations Team became aware of a website hosting a Google Android Application (APK) impersonating the legitimate RedAlert - Rocket Alerts application (<a href="https://play.google.com/store/apps/details?id=com.red.alert&amp;hl=en&amp;pli=1">https://play.google.com/store/apps/details?id=com.red.alert&amp;hl=en&amp;pli=1</a>).  More than 5,000 rockets have been launched into Israel since the attacks from Hamas began on October 7th 2023.  RedAlert - Rocket Alerts developed by Elad Nava allows individuals to receive timely and precise alerts about incoming airstrikes. Many people living in Israel rely on these alerts to seek safety - a service which has become increasingly important given the newest escalations in the region.</p><p>Applications alerting of incoming airstrikes have become targets as only days ago, Pro-Palestinian hacktivist group AnonGhost exploited a vulnerability in another application, “Red Alert: Israel” by Kobi Snir. (<a href="https://cybernews.com/cyber-war/israel-redalert-breached-anonghost-hamas/">https://cybernews.com/cyber-war/israel-redalert-breached-anonghost-hamas/</a>) Their exploit allowed them to intercept requests, expose servers and APIs, and send fake alerts to some app users, including a message that a “nuclear bomb is coming”. AnonGhost also claimed they attacked other rocket alert applications, including RedAlert by Elad Nava. As of October 11, 2023, the RedAlert app was reportedly functioning normally.</p><p>In the last two days, a new malicious website (<i>hxxps://redalerts[.]me</i>) has advertised the download of well-known open source application RedAlert by Elad Nava (<a href="https://github.com/eladnava/redalert-android">https://github.com/eladnava/redalert-android</a>). Domain impersonation continues to be a popular vector for attackers, as the legitimate website for the application (<i>hxxps://redalert[.]me</i> ) differs from the malicious website by only one letter. Further, threat actors continue to exploit open source code and deploy modified, malicious versions to unsuspecting users.</p><p>The malicious website hosted links to both the iOS and the Android version of the RedAlert app. But while the link to the Apple App Store referred to the legitimate version of the RedAlert app by Elad Nava, the link supposedly referring to the Android version hosted on the Play Store directly downloads a malicious APK file. This attack demonstrates the danger of sideloading applications directly from the Internet as opposed to installing applications from the approved app store.</p><p>The malicious RedAlert version imitates the legitimate rocket alert application but simultaneously collects sensitive user data. Additional permissions requested by the malicious app include access to contacts, call logs, SMS, account information, as well as an overview of all installed apps.</p><p>The website hosting the malicious file was created on October 12, 2023 and has since been taken offline. Only users who installed the Android version of the app from this specific website are impacted and urgently advised to delete the app. Users can determine if they installed the malicious version by reviewing the permissions granted to the RedAlert app. If users are unsure whether they installed the malicious version, they can delete the RedAlert applications and reinstall the legitimate version directly in the Play Store.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6nCyNtOTncD702msYn7mzW/9550d6742b8bbf6ba382d36166da4357/pasted-image-0--13-.png" />
            
            </figure><p><i>Screenshot of the attacker site </i><a href="https://redalerts\[.\]me"><i>https://redalerts\[.\]me</i></a></p>
    <div>
      <h3>Malicious Android Package Kit (APK) Analysis</h3>
      <a href="#malicious-android-package-kit-apk-analysis">
        
      </a>
    </div>
    <p>The malicious Android Package Kit (APK) file is installed by a user when they click the Google Play button on the fake RedAlert site. Once clicked, the user downloads the app directly from the fake site at <code><i>hxxps://redalerts[.]me/app.apk</i></code>. The SHA-256 hash of the APK is <code><i>5087a896360f5d99fbf4eb859c824d19eb6fa358387bf6c2c5e836f7927921c5</i></code>.</p>
    <div>
      <h2>Capabilities</h2>
      <a href="#capabilities">
        
      </a>
    </div>
    <p>A quick analysis of the <i>AndroidManifest.xml</i> file shows several differences compared to the legitimate, open source RedAlert application. Most notable are the additional permissions needed to collect information on the victim. The permissions added are listed below:</p><ul><li><p>android.permission.GET_ACCOUNTS</p></li><li><p>android.permission.QUERY_ALL_PACKAGES</p></li><li><p>android.permission.READ_CALL_LOG</p></li><li><p>android.permission.READ_CONTACTS</p></li><li><p>android.permission.READ_PHONE_NUMBERS</p></li><li><p>android.permission.READ_PHONE_STATE</p></li><li><p>android.permission.READ_PRIVILEGED_PHONE_STATE</p></li><li><p>android.permission.READ_SMS</p></li></ul><p>The application is designed to look and act like RedAlert. However, upon opening the app, a malicious service is started in the background. The <code><i>startService()</i></code> call is the only change to the <code><i>onCreate()</i></code> method, and this begins the sequence of malicious activity, which the actor has placed in a package called <code><i>com.company.allinclusive.AI</i></code></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5SOvfo0vzlyyREVB4A9Jyt/a3a971fe5b0860bb403528579a5f5393/pasted-image-0--14-.png" />
            
            </figure><p><i>The attacker starts their malicious code within the legitimate RedAlert code com.red.alert.activities: Main.java</i></p><p>The service is run to gather data from victims’ phones and upload it to the actor’s secure server. The data is extensive and includes:</p><ul><li><p>SIM information, including IMEI and IMSI numbers, network type, country, voicemail number, PIN status, and more</p></li><li><p>Full Contact list</p></li><li><p>All SMS messages, including content and metadata for all statuses (e.g. received, outgoing, sent, etc.)</p></li><li><p>A list of accounts associated with the device</p></li><li><p>All phone calls and conversation details for including incoming, outgoing, missed, rejected, and blocked calls</p></li><li><p>Logged-in email and app accounts</p></li><li><p>List of installed applications</p></li></ul><p>The actor’s code for gathering this information is illustrated below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/33VyzytviTDeG7qXy6aCrK/3f74918c7ceaaae9a9ce18fd650050a2/Screenshot-2023-10-13-at-3.32.27-PM.png" />
            
            </figure><p><i>com.company.allinclusive.AI: AIMain.java contains the data the attacker will capture form the target</i></p><p>Stolen data is uploaded to an HTTP server at a hardcoded IP address. The actor has a <i>Tools</i> class which details the IP address where the data is to be uploaded:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Fh4WgPsM5kmKnuM8Jqyxh/1307c4a8306bafcdfd47cc2f5e5323b8/Screenshot-2023-10-13-at-3.31.42-PM.png" />
            
            </figure><p><b>com.company.allinclusive.AI: Tools.java stores the attackers command and control for the malware</b></p><p>Although HTTP and port 80 are specified, the actor appears to have the ability to use HTTPS and port 443 if a certificate is found bundled within the application package:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ty1JMARyIggOGXmFoJjcE/7c4fe21747005a3882da8d2ca448583d/Screenshot-2023-10-13-at-3.30.20-PM.png" />
            
            </figure><p><i>com.company.allinclusive.AI: UploadFileAsync.java</i></p><p>Data is uploaded through a <i>Connector</i> class, written by the actor. The <i>Connector</i> is responsible for encrypting the stolen data and uploading it to the HTTP server. In this sample, files are encrypted with AES in CBC mode with PKCS5 Padding. The keys are randomly generated and appended to the packaged data, however the keys are encrypted with RSA using a public key bundled in the malicious app. Because of this, anybody who is able to intercept the stolen data will be unable to decrypt it without the actor’s private key.</p><p>The encrypted files have names that look like <i>_</i><i>.final</i>, which contain:</p><ul><li><p><i><b>_</b></i><i><b>.enc</b></i><b> (encrypted data)</b></p></li><li><p><i><b>_</b></i><i><b>.param</b></i><b> (AES encryption parameters, e.g. key and IV)</b></p></li><li><p><i><b>_</b></i><i><b>.eparam</b></i><b> (RSA parameters, e.g. public key)</b></p></li></ul>
    <div>
      <h2>Anti-Analysis Runtime Capabilities</h2>
      <a href="#anti-analysis-runtime-capabilities">
        
      </a>
    </div>
    <p>To avoid detection the actor included anti-analysis capabilities which can run at the time the app is started. The methods for anti-analysis that the attacker has included were anti-debugging, anti-emulation, and anti-test operations</p>
    <div>
      <h3>Anti-Debugging</h3>
      <a href="#anti-debugging">
        
      </a>
    </div>
    <p>The application makes a simple call using the builtin <i>android.os.Debug</i> package to see if the application is being debugged.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7n1Dsyz3tBVwTCQDzQjCpu/62e2fcf823fee0b7c1f144d1d302c557/Screenshot-2023-10-13-at-3.29.28-PM.png" />
            
            </figure><p><i>com.company.allinclusive.AI.anti.debugger: FindDebugger.java</i></p>
    <div>
      <h3>Anti-Emulation</h3>
      <a href="#anti-emulation">
        
      </a>
    </div>
    <p>The application attempts to locate certain files and identifiers to determine whether it is being run in an emulated environment. A snippet of these indicators are shown below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oRGahgfmW0fqsFZ3L7Bi1/c63b68f780e19a3a3d8f005db7e15c50/pasted-image-0--12--1.png" />
            
            </figure><p><i>com.company.allinclusive.AI.anti.emulator: FindEmulator.java checks for common emulators</i></p>
    <div>
      <h3>Anti-Test</h3>
      <a href="#anti-test">
        
      </a>
    </div>
    <p>The application has utilities to identify whether a test user (“monkey”) is using the application:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bibuD77OAXj6pBVkBb012/9d5c06d0c17b43978e70bfe6101ea8d4/Screenshot-2023-10-13-at-3.28.48-PM.png" />
            
            </figure><p><i>com.company.allinclusive.AI.anti.monkey: FindMonkey.java</i></p><p>These methodologies are all rudimentary checks for whether the application is under runtime analysis. It does not, however, protect the malicious code against static analysis.</p>
    <div>
      <h2>How To Detect This Malware On Your Device</h2>
      <a href="#how-to-detect-this-malware-on-your-device">
        
      </a>
    </div>
    <p>If you have installed RedAlert on your device, the extraneous permissions added by the actor can be used to determine whether you have been compromised. The following permissions appearing on the RedAlert app (whether or not enabled) would indicate compromise:</p><ul><li><p>Call Logs</p></li><li><p>Contacts</p></li><li><p>Phone</p></li><li><p>SMS</p></li></ul>
    <div>
      <h2>How To Protect Yourself</h2>
      <a href="#how-to-protect-yourself">
        
      </a>
    </div>
    <p>You can avoid attacks like this by following the guidance below:</p><ul><li><p>Keep your mobile device up to date on the latest software version at all times</p></li><li><p>Consider using Cloudflare Teams (with <a href="https://www.cloudflare.com/zero-trust/products/gateway/">Cloudflare Gateway</a>)</p></li><li><p>Avoid using third party mobile application stores</p></li><li><p>Never install applications from Internet URLs or sideload payloads</p></li><li><p>Consider using <a href="https://1.1.1.1/family/">1.1.1.1 for families</a> to block malicious domains on your network</p></li></ul>
    <div>
      <h2>IOCs</h2>
      <a href="#iocs">
        
      </a>
    </div>
    <table><colgroup><col></col><col></col></colgroup><tbody><tr><td><p><span>Type</span></p></td><td><p><span>Indicator</span></p></td></tr><tr><td><p><span>Malicious RedAlert APK Download URL</span></p></td><td><p><span>hxxp://redalerts[.]me/app.apk</span></p></td></tr><tr><td><p><span>Malicious RedAlert APK Command and Control</span></p></td><td><p><span>hxxp://23.254.228[.]135:80/file.php</span></p></td></tr><tr><td><p><span>Malicious RedAlert APK</span></p></td><td><p><span>5087a896360f5d99fbf4eb859c824d19eb6fa358387bf6c2c5e836f7927921c5</span></p></td></tr><tr><td><p><span>Public key, RSA/ECB/PKCS1Padding</span></p></td><td><p><span>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</span></p></td></tr></tbody></table><hr /><p>Under attack? Contact our <a href="https://www.cloudflare.com/under-attack-hotline/">hotline</a> to speak with someone immediately.<i>Visit</i> <a href="https://1.1.1.1/"><i>1.1.1.1</i></a> <i>from any device to get started with our free app that makes your Internet faster and safer.To learn more about our mission to help build a better Internet, start</i> <a href="https://www.cloudflare.com/learning/what-is-cloudflare/"><i>here</i></a><i>. If you’re looking for a new career direction, check out</i> <a href="https://cloudflare.com/careers"><i>our open positions</i></a><i>.</i></p> ]]></content:encoded>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <guid isPermaLink="false">5EMFsMJweR3mxektZeptQt</guid>
            <dc:creator>Blake Darché</dc:creator>
            <dc:creator>Armen Boursalian</dc:creator>
            <dc:creator>Javier Castro</dc:creator>
        </item>
        <item>
            <title><![CDATA[How sophisticated scammers and phishers are preying on customers of Silicon Valley Bank]]></title>
            <link>https://blog.cloudflare.com/how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank/</link>
            <pubDate>Tue, 14 Mar 2023 23:11:35 GMT</pubDate>
            <description><![CDATA[ In order to breach trust and trick unsuspecting victims, threat actors overwhelmingly use topical events as lures. The news about what happened at Silicon Valley Bank is the latest event to watch out for and stay vigilant against opportunistic phishing campaigns using SVB as the lure ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2K9Pq73I7we9IQNaqEV9Yk/dae023389b8cbdc00e8202d96378098c/SVB---Banking-Phishing.png" />
            
            </figure><p>By now, the news about what happened at Silicon Valley Bank (SVB) leading up to its <a href="https://www.cnn.com/2023/03/11/business/svb-collapse-roundup-takeaways/index.html">collapse</a> and takeover by the US Federal Government is well known. The rapid speed with which the collapse took place was surprising to many and the impact on organizations, both large and small, is expected to last a while.</p><p>Unfortunately, where everyone sees a tragic situation, threat actors see opportunity. We have seen this time and again - in order to breach trust and trick unsuspecting victims, threat actors overwhelmingly use topical events as lures. These follow the news cycle or known high profile events (The Super Bowl, March Madness, Tax Day, Black Friday sales, COVID-19, and on and on), since there is a greater likelihood of users falling for messages referencing what’s top of mind at any given moment.</p><p>The SVB news cycle makes for a similarly compelling topical event that threat actors can take advantage of; and it's crucial that organizations bolster their awareness campaigns and technical controls to help counter the eventual use of these tactics in upcoming attacks. It’s tragic that even as the FDIC is guaranteeing that SVB customers’ money is safe, bad actors are attempting to steal that very money!</p>
    <div>
      <h3>Preemptive action</h3>
      <a href="#preemptive-action">
        
      </a>
    </div>
    <p>In anticipation of future phishing attacks taking advantage of the SVB brand, <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> (Cloudflare’s threat operations and research team) significantly increased our brand monitoring focused on SVB’s digital presence starting March 10, 2023 and launched several additional detection modules to spot SVB-themed phishing campaigns. All of our customers taking advantage of our various <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">phishing protection services</a> automatically get the benefit of these new models.</p><p>Here’s an actual example of a real campaign involving SVB that’s happening since the bank was taken over by the FDIC.</p>
    <div>
      <h3>KYC phish - DocuSign-themed SVB campaign</h3>
      <a href="#kyc-phish-docusign-themed-svb-campaign">
        
      </a>
    </div>
    <p>A frequent tactic used by threat actors is to mimic ongoing KYC (Know Your Customer) efforts that banks routinely perform to validate details about their clients. This is intended to protect financial institutions against fraud, money laundering and financial crime, amongst other things.</p><p>On March 14, 2023, Cloudflare detected a large KYC phishing campaign leveraging the SVB brand in a DocuSign themed template. This campaign targeted Cloudflare and almost all industry verticals. Within the first few hours of the campaign, we detected 79 examples targeting different individuals in multiple organizations. Cloudflare is publishing one specific example of this campaign along with the tactics and observables seen to help customers be aware and vigilant of this activity.</p>
    <div>
      <h3>Campaign Details</h3>
      <a href="#campaign-details">
        
      </a>
    </div>
    <p>The phishing attack shown below targeted Matthew Prince, Founder &amp; CEO of Cloudflare on March 14, 2023. It included HTML code that contains an initial link and a complex redirect chain that is four-deep. The chain begins when the user clicks the ‘<i>Review Documents’</i> link. It takes the user to a trackable analytic link run by Sizmek by Amazon Advertising Server bs[.]serving-sys[.]com. The link then further redirects the user to a Google Firebase Application hosted on the domain na2signing[.]web[.]app. The na2signing[.]web[.]app HTML subsequently redirects the user to a WordPress site which is running yet another redirector at eaglelodgealaska[.]com. After this final redirect, the user is sent to an attacker-controlled docusigning[.]kirklandellis[.]net website.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CUrJjdOU6E91EhkVvJ97S/2539df0907ea0b9f546b5b4507ec99f7/Screenshot-2023-03-14-at-10.11.01.png" />
            
            </figure><p>Campaign Timeline</p>
            <pre><code>2023-03-14T12:05:28Z		First Observed SVB DocuSign Campaign Launched
2023-03-14T15:25:26Z		Last Observed SVB DocuSign Campaign Launched</code></pre>
            
    <div>
      <h3>A look at the HTML file Google Firebase application (na2signing[.]web[.]app)</h3>
      <a href="#a-look-at-the-html-file-google-firebase-application-na2signing-web-app">
        
      </a>
    </div>
    <p>The included HTML file in the attack sends the user to a WordPress instance that has recursive redirection capability. As of this writing, we are not sure if this specific WordPress installation has been compromised or a plugin was installed to open this redirect location.</p>
            <pre><code>&lt;html dir="ltr" class="" lang="en"&gt;&lt;head&gt;
    &lt;title&gt;Sign in to your account&lt;/title&gt;
    
    &lt;script type="text/javascript"&gt;
    window.onload = function() {
        function Redirect (url){
            window.location.href = url;
        }
        var urlParams = new URLSearchParams(window.location.href);
        var e = window.location.href;
        
       
        Redirect("https://eaglelodgealaska[.]com/wp-header.php?url="+e);
    }
&lt;/script&gt;
</code></pre>
            
    <div>
      <h3>Indicators of Compromise</h3>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    
            <pre><code>na2signing[.]web[.]app	Malicious Google Cloudbase Application.
eaglelodgealaska[.]com	Possibly compromised Wordpress website or an open redirect.

*[.]kirklandellis[.]net		Attacker Controlled Application running on at least docusigning[.]kirklandellis[.]net.</code></pre>
            
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <ol><li><p>Cloudflare Email Security customers can determine if they have received this campaign in their dashboard with the following search terms:</p><p><code>SH_6a73a08e46058f0ff78784f63927446d875e7e045ef46a3cb7fc00eb8840f6f0</code></p><p>Customers can also track IOCs related to this campaign through our Threat Indicators API. Any updated IOCs will be continually pushed to the relevant API endpoints.</p></li><li><p>Ensure that you have appropriate DMARC policy enforcement for inbound messages. Cloudflare recommends <b>[p = quarantine]</b> for any DMARC failures on incoming messages at a minimum. SVB’s DMARC records [<code>v=DMARC1; p=reject; pct=100</code>] explicitly state rejecting any messages that impersonate their brand and are not being sent from SVB’s list of designated and verified senders. Cloudflare Email Security customers will automatically get this enforcement based on SVB’s published DMARC records. For other domains, or to apply broader DMARC based policies on all inbound messages, Cloudflare recommends adhering to ‘Enhanced Sender Verification’ policies across all inbound emails within their <a href="https://developers.cloudflare.com/email-security/email-configuration/email-policies/">Cloudflare Area 1 dashboard</a>.</p></li><li><p>Cloudflare Gateway customers are automatically protected against these malicious URLs and domains. Customers can check their logs for these specific IOCs to determine if their organization had any traffic to these sites.</p></li><li><p>Work with your phishing awareness and training providers to deploy SVB-themed phishing simulations for your end users, if they haven’t done so already.</p></li><li><p>Encourage your end users to be vigilant about any ACH (Automated Clearing House) or SWIFT (Society for Worldwide Interbank Financial Telecommunication) related messages. ACH &amp; SWIFT are systems which financial institutions use for electronic funds transfers between entities. Given its large scale prevalence, ACH &amp; SWIFT phish are frequent tactics leveraged by threat actors to redirect payments to themselves. While we haven’t seen any large scale ACH campaigns utilizing the SVB brand over the past few days, it doesn’t mean they are not being planned or are imminent. Here are a few example subject lines to be aware of, that we have seen in similar payment fraud campaigns:</p><p><i>“We’ve changed our bank details”“Updated Bank Account Information”“YOUR URGENT ACTION IS NEEDED -Important - Bank account details change”“Important - Bank account details change”“Financial Institution Change Notice”</i></p></li><li><p>Stay vigilant against look-alike or cousin domains that could pop up in your email and web traffic associated with SVB. Cloudflare customers have in-built new domain controls within their email &amp; web traffic which would prevent <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">anomalous activity</a> coming from these new domains from getting through.</p></li><li><p>Ensure any public facing web applications are always patched to the latest versions and run a modern Web Application Firewall service in front of your applications. The campaign mentioned above took advantage of WordPress, which is frequently used by threat actors for their phishing sites. If you’re using the Cloudflare WAF, you can be automatically protected from third party CVEs before you even know about them. Having an effective <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> is critical to preventing threat actors from taking over your public Web presence and using it as part of a phishing campaign, SVB-themed or otherwise.</p></li></ol>
    <div>
      <h3>Staying ahead</h3>
      <a href="#staying-ahead">
        
      </a>
    </div>
    <p>Cloudforce One (Cloudflare’s threat operations team) proactively monitors emerging campaigns in their formative stages and publishes advisories and detection model updates to ensure our customers are protected. While this specific campaign is focused on SVB, the tactics seen are no different to other similar campaigns that our global network sees every day and automatically stops them before it impacts our customers.</p><p>Having a blend of strong technical controls across multiple communication channels along with a trained and vigilant workforce that is aware of the dangers posed by digital communications is crucial to stopping these attacks from going through.</p><p>Learn more about how Cloudflare can help in your own journey towards comprehensive phishing protection by using our <a href="https://www.cloudflare.com/zero-trust-hub/">Zero Trust services</a> and reach out for a <a href="https://www.cloudflare.com/lp/emailsecurity/">complimentary assessment today</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">7b0pR9io6vgFmhNY2MJybq</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Blake Darché</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudforce One is now generally available: empower your security team with threat data, tooling, and access to industry experts]]></title>
            <link>https://blog.cloudflare.com/cloudforce-one-is-now-ga/</link>
            <pubDate>Mon, 19 Sep 2022 14:01:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s threat operations and research team, Cloudforce One, is now open for business and has begun conducting threat briefings. Join our webinar on “YackingYeti: How a Russian threat group targets Ukraine—and the world”, scheduled for October 12, to learn more ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7iIWvmjFG1WB0gdKwJQhyf/f9c4774a7e4a3212e13b120d1b41456d/image5-2.png" />
            
            </figure><p>Cloudflare’s threat operations and research team, <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a>, is now open for business and has begun conducting threat briefings. Access to the team is available via an add-on subscription, and includes threat data and briefings, security tools, and the ability to make requests for information (RFIs) to the team.</p><p>Fill out <a href="https://www.cloudflare.com/zero-trust/lp/cloudforce-one-threat-intel-subscription">this form</a> or contact your account team to learn more.</p><p>Subscriptions come in two packages, and are priced based on number of employees: “Premier” includes our full history of threat data, bundled RFIs, and an API quota designed to support integrations with SIEMs. “Core” level includes reduced history and quotas. Both packages include access to all available security tools, including a threat investigation portal and sinkholes-as-a-service.</p><p>If you’re an enterprise customer interested in understanding the type of threat briefings that Cloudforce One customers receive, you can <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3932196/how-a-russian-threat-group-targets-ukraineand-the-world">register here</a> for “<i>YackingYeti: How a Russian threat group targets Ukraine—and the world</i>”, scheduled for October 12. The briefing will include Q&amp;A with Blake Darché, head of Cloudforce One, and an opportunity to learn more about the team and offering.</p>
    <div>
      <h2>Requests for Information (RFIs) and Briefings</h2>
      <a href="#requests-for-information-rfis-and-briefings">
        
      </a>
    </div>
    <p>The Cloudforce One team is composed of analysts assigned to five subteams: <i>Malware Analysis</i>, <i>Threat Analysis</i>, <i>Active Mitigation and Countermeasures</i>, <i>Intelligence Analysis</i>, and <i>Intelligence Sharing</i>. Collectively, they have tracked many of the most sophisticated cyber criminals on the Internet while at the National Security Agency (NSA), USCYBERCOM, and Area 1 Security, and have worked closely with similar organizations and governments to disrupt these threat actors. They’ve also been prolific in publishing “finished intel” reports on security topics of significant geopolitical importance, such as targeted attacks against governments, technology companies, the energy sector, and law firms, and have regularly briefed top organizations around the world on their efforts.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2tsbSpfHXSCltfIyZr1FE7/2a741bca5f2ee3053c2ae37824997a3f/image3-5.png" />
            
            </figure><p>Included with a Cloudforce One subscription is the ability to make “requests for information” (RFIs) to these experts. RFIs can be on any security topic of interest, and will be analyzed and responded to in a timely manner. For example, the Cloudforce One Malware Analysis team can accept uploads of possible malware and provide a technical analysis of the submitted resource. Each plan level comes with a fixed number of RFIs, and additional requests can be added.</p><p>In addition to customer-specific requests, Cloudforce One conducts regular briefings on a variety of threats and threat actors—those targeting specific industries as well as more general topics of interest.</p>
    <div>
      <h2>Threat Data</h2>
      <a href="#threat-data">
        
      </a>
    </div>
    <p>The best way to understand threats facing networks and applications connected to the Internet is to operate and protect critical, large scale Internet infrastructure. And to defend attacks against millions of customers, large and small. Since our early days, Cloudflare has set out to build one of the world’s largest global networks to do just that. Every <i>day</i> we answer trillions of <a href="https://1.1.1.1/">DNS queries</a>, track the issuance of millions <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL/TLS certificates</a> in our CT log, inspect millions of <a href="https://www.cloudflare.com/products/zero-trust/email-security/">emails</a> for threats, route multiple petabytes of traffic to our customers’ networks, and proxy trillions of HTTP <a href="https://www.cloudflare.com/application-security/">requests</a> destined for our customers’ applications. Each one of these queries and packets provides a unique data point that can be analyzed at scale and anonymized into actionable threat data—now available to our Cloudforce One customers.</p><p>Data sets now available in the dashboard and via API for subscribers include IP, ASN, and domain intelligence, passive <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS resolutions</a>; threat actor cards with indicators of compromise (IoC), open port, and new Managed IP Lists are planned for release later this year.</p>
    <div>
      <h2>Security Tools</h2>
      <a href="#security-tools">
        
      </a>
    </div>
    <p>Security analysts and <a href="https://www.cloudflare.com/learning/security/glossary/what-is-threat-hunting/">threat hunting teams</a> are being forced to do more with less in today’s operating environment, but that doesn’t reduce their need for reliable tools that can quickly identify and eliminate risks.</p><p>Bundled with Cloudforce One are several security tools that can be deployed as services to expedite threat hunting and remediation:</p>
    <div>
      <h3>Threat Investigation Portal</h3>
      <a href="#threat-investigation-portal">
        
      </a>
    </div>
    <ul><li><p>Located within Security Center, the <i>Investigate</i> tab is your portal for querying current and historical threat data on IPs, ASNs, URLs (new!), and domains.</p></li><li><p>URLs can now be scanned for phishing contents, with heuristic and machine learning-scored results presented on demand.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1N7AHaIj2bfdROEcD13gJP/6d4a76701d39099d3e9ef2fdd3573b32/image2-6.png" />
            
            </figure>
    <div>
      <h3>Brand Protection (new!)</h3>
      <a href="#brand-protection-new">
        
      </a>
    </div>
    <ul><li><p>Also located within the Security Center, the <i>Brand Protection</i> tab can be used to register keywords or assets (e.g., corporate logos, etc.) that customers wish to be notified of when they appear on the Internet.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6JslAprezcRaszLA9ZmJKO/3ceca23c8305a4c888fe0e28e66a9f14/image1-9.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gfTKr4hcficaPpZ841rU6/15746c4a64e0143f78ef6b2a0ef12db9/image4-2.png" />
            
            </figure>
    <div>
      <h3>Sinkholes (new!)</h3>
      <a href="#sinkholes-new">
        
      </a>
    </div>
    <ul><li><p>Sinkholes can be created on-demand, as a service, to monitor hosts infected with malware and prevent them from communicating with command-and-control (C2) servers.</p></li><li><p>After creating a sinkhole via API, an IP will be returned which can be used with DNS products like <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> to route web requests to safe sinkholes (and away from C2 servers). Sinkholes can be used to intercept SMTP traffic.</p></li><li><p>Premier customers can also bring their own IP address space to use for sinkholes, to accommodate egress firewall filtering or other use cases. In the future we plan to extend our sinkhole capability to the network layer, which will allow it to be deployed alongside offerings such as Magic Transit and Magic WAN.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3v07Z6np6EgraBivUfnUaj/b74e9fb8e8b2f5810b2f6daad48184d3/code.png" />
            
            </figure>
    <div>
      <h2>Getting Started with Cloudforce One</h2>
      <a href="#getting-started-with-cloudforce-one">
        
      </a>
    </div>
    <p>Cloudforce One is open for business and ready to answer your security inquiries. Speak to your account manager or fill out <a href="https://www.cloudflare.com/zero-trust/lp/cloudforce-one-threat-intel-subscription">this form</a> to learn more. We hope to see you on the <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3932196/how-a-russian-threat-group-targets-ukraineand-the-world">upcoming webinar</a>!</p>
    <div>
      <h2>Watch on Cloudflare TV</h2>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[GA Week]]></category>
            <category><![CDATA[General Availability]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Security Center]]></category>
            <guid isPermaLink="false">50ddxtwu6Je6xDmDyuTzGU</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
            <dc:creator>Blake Darché</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudforce One: our new threat operations and research team]]></title>
            <link>https://blog.cloudflare.com/introducing-cloudforce-one-threat-operations-and-threat-research/</link>
            <pubDate>Tue, 21 Jun 2022 12:59:32 GMT</pubDate>
            <description><![CDATA[ Meet our new threat operations and research team: Cloudforce One. While this team will publish research, that’s not its reason for being. Its primary objective: track and disrupt threat actors ]]></description>
            <content:encoded><![CDATA[ <p>Meet our new threat operations and research team: <b>Cloudforce One</b>. While this team will publish research, that’s not its reason for being. Its primary objective: track and disrupt threat actors.</p><p>The security teams we speak with tell us the same thing: they’re inundated with reports from threat intelligence and security product vendors that do little to improve their actual security. The stories are indeed interesting, but they want deeper insights into the techniques and actors targeting their industry—but even more than that, they want to be <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protected against these threats</a> with minimal to no involvement. That is the mission on which Cloudforce One will deliver.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5E3vjD4PVauWQqxEeAsouT/72a317c5c8c34f9bc522dc0bf58be850/image1-19.png" />
            
            </figure><p>This team is led by me, Blake Darché, Area 1’s co-founder and former head of Threat Intelligence. Before starting Area 1, which was <a href="/why-we-are-acquiring-area-1/">acquired by Cloudflare earlier this year</a>, I was a founding member of CrowdStrike’s services organization, and before that a Computer Network Exploitation Analyst at the National Security Agency (NSA). My career has focused on identifying and disrupting sophisticated nation-state sponsored cyber threats before they compromise enterprises and governments, and I’m excited to accelerate that work at Cloudflare.</p><p>The Cloudforce One team comprises analysts assigned to Threat Research, Malware and Vulnerability Research, and Threat Operations (i.e., disrupting actors once identified). Collectively, members of the team have tracked many of the most sophisticated cyber criminals on the Internet while at the National Security Agency and Area 1 Security, and have worked closely with similar organizations and governments to disrupt these threat actors. They’ve also been prolific in publishing “finished intel” reports on security topics of significant geopolitical importance, such as targeted attacks against governments, technology companies, the energy sector, and law firms, and have regularly briefed top organizations around the world on their efforts. Oh, and we’re growing the team, so please reach out if you’re interested.</p>
    <div>
      <h3>How will Cloudforce One work?</h3>
      <a href="#how-will-cloudforce-one-work">
        
      </a>
    </div>
    <p>First and foremost, the team will help protect all Cloudflare customers by working closely with our existing product, engineering, and security teams to improve our products based on tactics, techniques, and procedures (TTPs) observed in the wild. Customers will get better protection without having to take any action, and will be able to read a subset of research published on our blog and within the Cloudflare Security Center.</p><p>Additionally, enterprise customers who wish to receive one-on-one live briefings from the team, submit periodic inquiries for follow-up, and obtain early access to threat research, will soon be able to sign up for our new Threat Intelligence subscription. All other enterprise customers will be invited to join periodic group briefings.</p><p>Lastly, new capabilities within Security Center, such as access to historical threat data via API and threat pivoting features, will also be introduced by the dedicated threat intel engineering team paired with Cloudforce One.</p>
    <div>
      <h3>Getting started</h3>
      <a href="#getting-started">
        
      </a>
    </div>
    <p>If you’re looking to benefit from the insights uncovered by Cloudforce One, there is nothing you need to do. But if you’re interested in receiving regular briefings from Cloudforce One tailored to your industry, contact your Customer Success manager today or fill out <a href="http://www.cloudflare.com/zero-trust/lp/cloudforce-one-threat-intel-subscription">this form</a> and someone will be in touch. Finally, if you’re interested in joining the team, check out our open job postings <a href="https://boards.greenhouse.io/cloudflare/jobs/4269981?gh_jid=4269981">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <guid isPermaLink="false">1LSwJPo5HJmviB2j0D1C3J</guid>
            <dc:creator>Blake Darché</dc:creator>
        </item>
    </channel>
</rss>