
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 09:54:54 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Cloudy Summarizations of Email Detections: Beta Announcement]]></title>
            <link>https://blog.cloudflare.com/cloudy-driven-email-security-summaries/</link>
            <pubDate>Fri, 29 Aug 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ We're now leveraging our internal LLM, Cloudy, to generate automated summaries within our Email Security product, helping SOC teams better understand what's happening within flagged messages. ]]></description>
            <content:encoded><![CDATA[ 
    <div>
      <h2>Background</h2>
      <a href="#background">
        
      </a>
    </div>
    <p>Organizations face continuous threats from <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>phishing</u></a>,<a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/"><u> business email compromise (BEC)</u></a>, and other advanced email attacks. Attackers <a href="https://www.cloudflare.com/the-net/multichannel-phishing/"><u>adapt their tactics</u></a> daily, forcing defenders to move just as quickly to keep inboxes safe.</p><p>Cloudflare’s visibility across a large portion of the Internet gives us an unparalleled view of malicious campaigns. We process billions of email threat signals every day, feeding them into multiple AI and machine learning models. This lets our detection team create and deploy new rules at high speed, blocking malicious and unwanted emails before they reach the inbox.</p><p>But rapid protection introduces a new challenge: making sure security teams understand exactly what we blocked — and why.</p>
    <div>
      <h2>The Challenge</h2>
      <a href="#the-challenge">
        
      </a>
    </div>
    <p>Cloudflare’s fast-moving detection pipeline is one of our greatest strengths — but it also creates a communication gap for customers. Every day, our detection analysts publish new rules to block phishing, BEC, and other unwanted messages. These rules often blend signals from multiple AI and machine learning models, each looking at different aspects of a message like its content, headers, links, attachments, and sender reputation.</p><p>While this layered approach catches threats early, SOC teams don’t always have insight into the specific combination of factors that triggered a detection. Instead, they see a rule name in the investigation tab with little explanation of what it means.</p><p>Take the rule <i>BEC.SentimentCM_BEC.SpoofedSender</i> as an example. Internally, we know this indicates:</p><ul><li><p>The email contained no unique links or attachments a common BEC pattern</p></li><li><p>It was flagged as highly likely to be BEC by our Churchmouse sentiment analysis models</p></li><li><p>Spoofing indicators were found, such as anomalies in the envelope_from header</p></li></ul><p>Those details are second nature to our detection team, but without that context, SOC analysts are left to reverse-engineer the logic from opaque labels. They don’t see the nuanced ML outputs (like Churchmouse’s sentiment scoring) or the subtle header anomalies, or the sender IP/domain reputation data that factored into the decision.</p><p>The result is time lost to unclear investigations or the risk of mistakenly releasing malicious emails. For teams operating under pressure, that’s more than just an inconvenience, it's a security liability.</p><p>That’s why we extended Cloudy (our AI-powered agent) to translate complex detection logic into clear explanations, giving SOC teams the context they need without slowing them down.</p>
    <div>
      <h2>Enter Cloudy Summaries</h2>
      <a href="#enter-cloudy-summaries">
        
      </a>
    </div>
    <p>Several weeks ago, we launched Cloudy within our Cloudflare One product suite to help customers understand gateway policies and their impacts (you can read more about the launch here: https://blog.cloudflare.com/introducing-ai-agent/).</p><p>We began testing Cloudy's ability to explain the detections and updates we continuously deploy. Our first attempt revealed significant challenges.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/63bsCRl2hKUyECh1vJND5k/a033fce3c95a635ede07e1fd03a9edf5/image3.png" />
          </figure>
    <div>
      <h3>The Hallucination Problem</h3>
      <a href="#the-hallucination-problem">
        
      </a>
    </div>
    <p>We observed frequent LLM <a href="https://www.cloudflare.com/learning/ai/what-are-ai-hallucinations/"><u>hallucinations</u></a>, the model generating inaccurate information about messages. While this might be acceptable when analyzing logs, it's dangerous for email security detections. A hallucination claiming a malicious message is clean could lead SOC analysts to release it from quarantine, potentially causing a security breach.</p><p>These hallucinations occurred because email detections involve numerous and complex inputs. Our scanning process runs messages through multiple ML algorithms examining different components: body content, attachments, links, IP reputation, and more. The same complexity that makes manual detection explanation difficult also caused our initial LLM implementation to produce inconsistent and sometimes inaccurate outputs.</p>
    <div>
      <h3>Building Guardrails</h3>
      <a href="#building-guardrails">
        
      </a>
    </div>
    <p>To minimize hallucination risk while maintaining inbox security, we implemented several manual safeguards:</p><p><b>Step 1: RAG Implementation</b></p><p>We ensured Cloudy only accessed information from our detection dataset corpus, creating a <a href="https://www.cloudflare.com/learning/ai/retrieval-augmented-generation-rag/"><u>Retrieval-Augmented Generation (RAG)</u></a> system. This significantly reduced hallucinations by grounding the LLM's assessments in actual detection data.</p><p><b>Step 2: Model Context Enhancement</b></p><p>We added crucial context about our internal models. For example, the "Churchmouse" designation refers to a group of sentiment detection models, not a single algorithm. Without this context, Cloudy attempted to define "churchmouse" using the common idiom "poor as a church mouse" referencing starving church mice because holy bread never falls to the floor. While historically interesting, this was completely irrelevant to our security context.</p>
    <div>
      <h3>Current Results</h3>
      <a href="#current-results">
        
      </a>
    </div>
    <p>Our testing shows Cloudy now produces more stable explanations with minimal hallucinations. For example, the detection <i>SPAM.ASNReputation.IPReputation_Scuttle.Anomalous_HC</i> now generates this summary:</p><p>"This rule flags email messages as spam if they come from a sender with poor Internet reputation, have been identified as suspicious by a blocklist, and have unusual email server setup, indicating potential malicious activity."</p><p>This strikes the right balance. Customers can quickly understand what the detection found and why we classified the message accordingly.</p>
    <div>
      <h2>Beta Program</h2>
      <a href="#beta-program">
        
      </a>
    </div>
    <p>We're opening Cloudy email detection summaries to a select group of beta users. Our primary goal is ensuring our guardrails prevent hallucinations that could lead to security compromises. During this beta phase, we'll rigorously test outputs and verify their quality before expanding access to all customers.</p>
    <div>
      <h2>Ready to enhance your email security?</h2>
      <a href="#ready-to-enhance-your-email-security">
        
      </a>
    </div>
    <p>We provide all organizations (whether a Cloudflare customer or not) with free access to our Retro Scan tool, allowing them to use our predictive AI models to scan existing inbox messages. Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using <a href="https://www.cloudflare.com/zero-trust/products/email-security/"><u>Cloudflare Email Security</u></a> or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p><p>If you are interested in how Cloudflare can help secure your inboxes, sign up for a phishing risk assessment <a href="https://www.cloudflare.com/lp/email-security-self-guided-demo-request/?utm_medium=referral&amp;utm_source=blog&amp;utm_campaign=2025-q3-acq-gbl-modernsec-es-ge-general-ai_week_blog"><u>here</u></a>. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lV6mxQTYwaS6j0n0e8arE/fd62cf8032b15780690f4ed48578d3fc/image2.png" />
          </figure><div>
  
</div><p></p> ]]></content:encoded>
            <category><![CDATA[AI Week]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[LLM]]></category>
            <guid isPermaLink="false">hzXLKdI5wqNlvwd0JKzXS</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Nick Blazier</dc:creator>
            <dc:creator>Phil Syme</dc:creator>
        </item>
        <item>
            <title><![CDATA[The role of email security in reducing user risk amid rising threats]]></title>
            <link>https://blog.cloudflare.com/the-role-of-email-security-in-reducing-user-risk-amid-rising-threats/</link>
            <pubDate>Thu, 19 Dec 2024 14:00:00 GMT</pubDate>
            <description><![CDATA[ As threats evolve, SOC teams must adapt their operations. With Cloudflare’s holistic approach to managing user-based risk, SOC teams can operate more efficiently and reduce the likelihood of a breach. ]]></description>
            <content:encoded><![CDATA[ <p>Phishing remains one of the most dangerous and persistent cyber threats for individuals and organizations. Modern attacks use a growing arsenal of deceptive techniques that bypass traditional <a href="https://www.cloudflare.com/en-gb/learning/email-security/secure-email-gateway-seg/"><u>secure email gateways (SEGs)</u></a> and email authentication measures, targeting organizations, employees, and vendors. From <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/"><u>business email compromise (BEC)</u></a> to <a href="https://www.cloudflare.com/en-gb/learning/security/what-is-quishing/"><u>QR phishing</u></a> and <a href="https://www.cloudflare.com/en-gb/learning/access-management/account-takeover/"><u>account takeovers</u></a>, these threats are designed to exploit weaknesses across multiple communication channels, including email, Slack, Teams, SMS, and cloud drives.</p><p>Phishing remains the most popular attack vector for bad actors looking to gain unauthorized access or extract fraudulent payment, and it is <a href="https://blog.cloudflare.com/2023-phishing-report/"><u>estimated</u></a> that 90% of all attacks <a href="https://www.cisa.gov/shields-guidance-families"><u>start</u></a> with a <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/"><u>phishing</u></a> email. However, as companies have shifted to using a multitude of apps to support communication and collaboration, attackers too have evolved their approach. Attackers now engage employees across a combination of channels in an attempt to build trust and pivot targeted users to less-secure apps and devices. Cloudflare is uniquely positioned to address this trend thanks to our integrated <a href="https://www.cloudflare.com/zero-trust/"><u>Zero Trust</u></a> services, extensive visibility from protecting <a href="https://w3techs.com/technologies/overview/proxy/all"><u>approximately 20% of all websites</u></a>, and signals derived from processing billions of email messages a year.</p><p>Cloudflare recognizes that combating phishing requires an integrated approach and a more complete view of user-based risk. That’s why we’ve designed our email security solution to protect organizations before, during, and after message delivery, while also extending protection beyond email into the broader security ecosystem. Phishing is no longer just an email problem — it’s a multi-channel, cross-application threat.</p>
    <div>
      <h2>Assessing holistic user risk</h2>
      <a href="#assessing-holistic-user-risk">
        
      </a>
    </div>
    <p>When it comes to protecting against user-based threats, Cloudflare employs a platform approach to security. Instead of forcing customers to rely on an array of fragmented tools that create unnecessary complexity and blind spots, we treat email security as part of an overall strategy for assessing and responding to user-related risk. Our email security solution works in tandem with our network solutions so that SOC teams can quickly assert what actions their users are performing outside of email. Given our extensive network visibility, our platform is not limited by API integrations, and can provide SOC teams with the best visibility and protection. This helps SOC teams not only combat phishing, but begin to identify and take action against a wider range of insider threats.</p><p>Within a single, unified dashboard, SOC teams can quickly review detailed information regarding the following questions, which we discuss in more detail below: </p><ol><li><p>Who in the organization is being targeted?</p></li><li><p>Who are the attackers impersonating?</p></li><li><p>What risky behaviors are my users performing?</p></li></ol>
    <div>
      <h3>Who in the organization is being targeted?</h3>
      <a href="#who-in-the-organization-is-being-targeted">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hCZ0UXnPA7Wx5iBHxkfjE/47a143332f6c22c7e11b568b43dfdd74/BLOG-2645_2.png" />
          </figure><p>Within the Cloudflare dashboard, SOC teams can view which users are the most targeted. This can help them determine which accounts should be hardened (e.g. MFA enforced), and identify risky users that should be monitored more closely for significant deviations in behavior. One way organizations can use this information is to require high-risk users to connect from a managed device. For instance, if they use Crowdstrike, <a href="https://developers.cloudflare.com/cloudflare-one/identity/devices/service-providers/crowdstrike/"><u>we can require that these users be on a managed device</u></a> and force a posture check before letting them access sensitive applications. </p><p>SOC teams can also dive into what types of attacks are hitting their users and at what frequency.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2nVgW0EXy3qzC2hDBeJRAx/5cf8408ec72339fe8985019629912cbb/BLOG-2645_3.png" />
          </figure><p>Customers can use these insights to adjust various platform policies, effectively blocking malicious content and securing sensitive resources. Above, we can see that attackers are frequently leveraging links to try to compromise users. Based on the link analysis we are seeing in email, SOC teams can use our gateway to block similar attacks, so that when attackers try to use other communication methods (LinkedIn, Teams, Slack, etc.) users will not be able to interact with those links.</p><p>To learn more about stopping these types of multichannel phishing attacks, please see our blog post, <a href="https://blog.cloudflare.com/a-wild-week-in-phishing-and-what-it-means-for-you/"><i><u>A wild week in phishing, and what it means for you</u></i></a><i>.</i></p>
    <div>
      <h3>Who are the attackers impersonating?</h3>
      <a href="#who-are-the-attackers-impersonating">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16lvS6lNsi4TuSgtMFqBtk/b093ecb444def1bd06fb84566b5eb05a/BLOG-2645_4.png" />
          </figure><p>SOC teams can also get visibility into impersonation attempts within their email environment. Customers can see which users are being impersonated the most, and can use this information to build policies within our email security solution and broader set of Zero Trust services.</p><p>A list of frequently impersonated users can be added to the <a href="https://developers.cloudflare.com/cloudflare-one/email-security/detection-settings/impersonation-registry/"><u>impersonation registry</u></a>, which changes the sensitivity of our models to apply more scrutiny on messages coming from those users. </p><p>Given our unique position as a <a href="https://www.cloudflare.com/products/registrar/"><u>domain name registrar</u></a>, customers can also report lookalike domains to Cloudflare for action to be taken against them. This helps prevent attackers from being able to impersonate our customers and negatively impact their reputation. </p><p>Finally, customers can also use our free <a href="https://developers.cloudflare.com/dmarc-management/"><u>DMARC management</u></a> to track who is sending emails on their behalf. This information can be used to update <a href="https://www.cloudflare.com/en-gb/learning/dns/dns-records/dns-spf-record/"><u>SPF records</u></a> and get customers to <code>p=quarantine</code> or <code>p=reject</code> so that their brand is more resistant to being spoofed. </p>
    <div>
      <h3>What risky behaviors are my users performing?</h3>
      <a href="#what-risky-behaviors-are-my-users-performing">
        
      </a>
    </div>
    <p>Cloudflare provides visibility into user actions in several ways. </p><p>Within the email security solution, we can track internal messages and alert if we see any malicious or suspicious behaviors. This can be enhanced with our managed service offering, <a href="https://developers.cloudflare.com/cloudflare-one/email-security/phish-guard/"><u>Phishguard</u></a>, which can alert admins when they see any type of behavior that indicates fraud (like Business Email Compromise), account takeover, or insider threats.</p><p>SOC teams can also take advantage of our <a href="https://www.cloudflare.com/en-gb/zero-trust/products/casb/"><u>CASB solution</u></a> to view the different actions that users have performed. Actions are labeled with different risk levels to let teams know which findings are critical and require remediation. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aiDl5Qo2PGsGYF7NfYcDT/dc49eb88beffc7b9df099d71244489c9/BLOG-2645_5.png" />
          </figure><p>Customers are also able to view data loss prevention (<a href="https://www.cloudflare.com/en-gb/zero-trust/products/dlp/"><u>DLP</u></a>) violations that users have incurred to see if there is any unauthorized egress of data. We provide the ability to automatically block this egress based on different policies within our platform, making sure there is no exfiltration of sensitive data.</p><p>We also enable organizations to put internal applications behind our <a href="https://www.cloudflare.com/en-gb/zero-trust/products/access/"><u>Access</u></a> solution. This prevents any users with improper permissions or a high risk level from accessing critical applications. Our dashboard then provides metrics on these logins to see how many failures we observed, so that SOC teams can investigate the user further. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/34LnlEK1lkpbeW5mYLSl8m/5d51092b134bfd7e2d6093a04fcfdc60/BLOG-2645_6.png" />
          </figure><p>These signals feed into our <a href="https://blog.cloudflare.com/unified-risk-posture/"><u>Unified Risk Score</u></a>, which can be exported if needed to take automated actions within other platforms.</p>
    <div>
      <h2>Increasing SOC productivity</h2>
      <a href="#increasing-soc-productivity">
        
      </a>
    </div>
    <p>With all of our functionality unified within a single interface and fed by one data lake, we see an increase in SOC productivity because teams no longer have to spend time building rules or flipping between disparate interfaces and workflows. </p>
    <div>
      <h3>AI-driven email security</h3>
      <a href="#ai-driven-email-security">
        
      </a>
    </div>
    <p>Unlike legacy secure email gateways, our email security solution is driven by predictive AI models which eliminate the need for creating and updating rules. These models are also more effective than reactive measures because they are fed by a massive volume of diverse data from across Cloudflare’s network. This means models are trained on emerging threats earlier and can identify new tactics with a higher accuracy than legacy systems. </p>
    <div>
      <h3>Automated isolation</h3>
      <a href="#automated-isolation">
        
      </a>
    </div>
    <p>To further reduce the risk posed by users visiting potentially malicious websites, customers can isolate browser sessions using our natively integrated, clientless remote browser that runs on our <a href="https://www.cloudflare.com/network"><u>global network</u></a>. Within an isolated browsing session, SOC teams can prohibit various behaviors such as copy/paste, upload/download, keyboard inputs, and more. This decreases the risk of users accessing a website and performing an action which could compromise the organization.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/65YXZvV78mjzNXvV4YLJRD/b0ef76d80edd7769a23d877ffdc25696/BLOG-2645_7.png" />
          </figure><p>Our browser isolation solution also decreases the time SOC teams need to maintain policies. Rather than adding domains and applications one by one, teams can choose to isolate based on content categories. These categories are based on our threat intelligence, and are constantly updated. This means that as new websites emerge, SOC teams do not have to spend the time to chase down and update the proper policy — rather, it is done automatically. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aCMZRmIRp33YbGTU5Vxt6/44ca92e4e3cde07b1424b9875311dd59/BLOG-2645_8.png" />
          </figure>
    <div>
      <h3>Automated blocking</h3>
      <a href="#automated-blocking">
        
      </a>
    </div>
    <p>While some websites might require running in an isolated browser to mitigate the risk of users encountering malicious content, others may need to be fully blocked altogether. Customers can use the same process listed above to block any website that could be risky for users based on tags. However, we allow admins to also provide feedback to users to increase awareness. This can be done via a <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/block-page/"><u>custom block page</u></a> that allows SOC teams to communicate with users about their risky behaviors, so that they take actions to curb this behavior in the future and alert their SOC teams to attacks that might be occurring. </p>
    <div>
      <h2>What's on the horizon for 2025</h2>
      <a href="#whats-on-the-horizon-for-2025">
        
      </a>
    </div>
    <p>In 2024, our email security team focused on refining the user interface and improving the incident investigation experience. Looking ahead to 2025, we plan to introduce additional capabilities that deepen the integration of our email security solution with our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> platform, delivering enhanced insight and protection against user-based threats. </p>
    <div>
      <h3>Configurable browser isolation for email</h3>
      <a href="#configurable-browser-isolation-for-email">
        
      </a>
    </div>
    <p>Our Email Link Isolation feature currently applies to links we consider suspicious. However, we intend to allow customers to add customized configurations to meet their internal policies. This enhancement will provide more granular control over which websites users can access from an email message without using an isolated browser. </p>
    <div>
      <h3>Outbound DLP for email</h3>
      <a href="#outbound-dlp-for-email">
        
      </a>
    </div>
    <p>We will be releasing an add-in for Microsoft Outlook that will allow customers to use our DLP engine for inspecting outbound email messages. This client-side application enables customers to configure downstream policies that trigger action when a DLP policy is violated, all while minimizing disruption to existing email infrastructure. </p>
    <div>
      <h3>Expanded user risk scoring</h3>
      <a href="#expanded-user-risk-scoring">
        
      </a>
    </div>
    <p>Cloudflare will be increasing the signals that feed into our user risk scores. This will enable SOC teams to create more policies within Cloudflare or to take automated actions externally based on the level of risk observed. </p><p>These are just a few examples of significant releases that will be coming in 2025. Please stay tuned to the Cloudflare blog where we will be announcing these releases as they happen. </p>
    <div>
      <h2>Try Cloudflare Email Security today</h2>
      <a href="#try-cloudflare-email-security-today">
        
      </a>
    </div>
    <p>We provide all organizations (whether a Cloudflare customer or not) with free access to our <a href="https://blog.cloudflare.com/threats-lurking-office-365-cloudflare-email-retro-scan/"><u>Retro Scan</u></a> tool, allowing them to use our predictive AI models to scan existing inbox messages. Retro Scan will detect and highlight any threats found, enabling organizations to remediate them directly in their email accounts. With these insights, organizations can implement further controls, either using Cloudflare Email Security or their preferred solution, to prevent similar threats from reaching their inboxes in the future.</p> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">4fVFiDpaCJhYAFUvAocDDC</guid>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Justin Knapp</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare acquires Kivera to add simple, preventive cloud security to Cloudflare One ]]></title>
            <link>https://blog.cloudflare.com/cloudflare-acquires-kivera/</link>
            <pubDate>Tue, 08 Oct 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ The acquisition of Kivera broadens the scope of Cloudflare’s SASE platform beyond just apps, incorporating increased cloud security through proactive configuration management of cloud services.  ]]></description>
            <content:encoded><![CDATA[ <p>We’re excited to announce that <a href="https://www.kivera.io/"><u>Kivera</u></a>, a cloud security, data protection, and compliance company, has joined Cloudflare. This acquisition extends our SASE portfolio to incorporate inline cloud app controls, empowering <a href="https://www.cloudflare.com/zero-trust/"><u>Cloudflare One</u></a> customers with preventative security controls for all their cloud services.</p><p>In today’s digital landscape, cloud services and SaaS (software as a service) apps have become indispensable for the daily operation of organizations. At the same time, the amount of data flowing between organizations and their cloud providers has ballooned, increasing the chances of data leakage, compliance issues, and worse, opportunities for attackers. Additionally, many companies — especially at enterprise scale — are working directly with multiple cloud providers for flexibility based on the strengths, resiliency against outages or errors, and cost efficiencies of different clouds. </p><p>Security teams that rely on <a href="https://www.cloudflare.com/learning/cloud/what-is-cspm/"><u>Cloud Security Posture Management (CSPM)</u></a> or similar tools for monitoring cloud configurations and permissions and Infrastructure as code (IaC) scanning are falling short due to detecting issues only after misconfigurations occur with an overwhelming volume of alerts. The combination of Kivera and Cloudflare One puts preventive controls directly into the deployment process, or ‘inline’, blocking errors before they happen. This offers a proactive approach essential to protecting cloud infrastructure from evolving cyber threats, <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">maintaining data security</a>, and accelerating compliance. </p>
    <div>
      <h2>An early warning system for cloud security risks </h2>
      <a href="#an-early-warning-system-for-cloud-security-risks">
        
      </a>
    </div>
    <p>In a significant leap forward in cloud security, the combination of Kivera’s technology and Cloudflare One adds preventive, inline controls to enforce secure configurations for cloud resources. By inspecting cloud API traffic, these new capabilities equip organizations with enhanced visibility and granular controls, allowing for a proactive approach in mitigating risks, managing cloud security posture, and embracing a streamlined DevOps process when deploying cloud infrastructure.</p><p>Kivera will add the following capabilities to Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>SASE</u></a> platform:</p><ul><li><p><b>One-click security:</b> Customers benefit from immediate prevention of the most common cloud breaches caused by misconfigurations, such as accidentally allowing public access or policy inconsistencies.</p></li><li><p><b>Enforced cloud tenant control:</b> Companies can easily draw boundaries around their cloud resources and tenants to ensure that sensitive data stays within their organization. </p></li><li><p><b>Prevent data exfiltration:</b> Easily set rules to prevent data being sent to unauthorized locations.</p></li><li><p><b>Reduce ‘shadow’ cloud infrastructure:</b> Ensure that every interaction between a customer and their cloud provider is in line with preset standards. </p></li><li><p><b>Streamline cloud security compliance:</b> Customers can automatically assess and enforce compliance against the most common regulatory frameworks.</p></li><li><p><b>Flexible DevOps model:</b> Enforce bespoke controls independent of public cloud setup and deployment tools, minimizing the layers of lock-in between an organization and a cloud provider.</p></li><li><p><b>Complementing other cloud security tools:</b> Create a first line of defense for cloud deployment errors, reducing the volume of alerts for customers also using CSPM tools or <a href="https://www.cloudflare.com/learning/cloud/cnapp/">Cloud Native Application Protection Platforms (CNAPPs)</a>. </p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7nALx5Qv8FBYxn1R6RkUvX/1b3dddb60d9d85142a9fda82d2eee381/BLOG-2592_2.png" />
          </figure><p><sub><i>An intelligent proxy that uses a policy-based approach to 
enforce secure configuration of cloud resources.</i></sub></p>
    <div>
      <h2>Better together with Cloudflare One</h2>
      <a href="#better-together-with-cloudflare-one">
        
      </a>
    </div>
    <p>As a SASE platform, Cloudflare One ensures safe access and provides data controls for cloud and SaaS apps. This integration broadens the scope of Cloudflare’s SASE platform beyond user-facing applications to incorporate increased cloud security through proactive configuration management of infrastructure services, beyond what CSPM and <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/"><u>CASB</u></a> solutions provide. With the addition of Kivera to Cloudflare One, customers now have a unified platform for all their inline protections, including cloud control, access management, and threat and data protection. All of these features are available with single-pass inspection, which is <a href="https://blog.cloudflare.com/network-performance-update-cio-edition/?_ga=2.241337794.1947644748.1710771073-1224524116.1709647459"><u>50% faster</u></a> than <a href="https://www.cloudflare.com/learning/access-management/what-is-a-secure-web-gateway/"><u>Secure Web Gateway (SWG)</u></a> alternatives.  </p><p>With the earlier <a href="https://blog.cloudflare.com/cloudflare-acquires-bastionzero/"><u>acquisition of BastionZero</u></a>, a Zero Trust infrastructure access company, Cloudflare One expanded the scope of its VPN replacement solution to cover infrastructure resources as easily as it does apps and networks. Together Kivera and BastionZero enable centralized security management across hybrid IT environments, and provide a modern DevOps-friendly way to help enterprises connect and protect their hybrid infrastructure with Zero Trust best practices.</p><p>Beyond its SASE capabilities, Cloudflare One is integral to <a href="https://www.cloudflare.com/connectivity-cloud/"><u>Cloudflare’s connectivity cloud</u></a>, enabling organizations to consolidate IT security tools on a single platform. This simplifies secure access to resources, from developer privileged access to technical infrastructure and expanding cloud services. As <a href="https://www.cloudflare.com/lp/forrester-wave-sse-2024/"><u>Forrester echoes</u></a>, “Cloudflare is a good choice for enterprise prospects seeking a high-performance, low-maintenance, DevOps-oriented solution.”</p>
    <div>
      <h2>The growing threat of cloud misconfigurations</h2>
      <a href="#the-growing-threat-of-cloud-misconfigurations">
        
      </a>
    </div>
    <p>The cloud has become a prime target for cyberattacks. According to the <a href="https://www.crowdstrike.com/resources/reports/crowdstrike-2023-cloud-risk-report-executive-summary/"><u>2023 Cloud Risk Report</u></a>, CrowdStrike observed a 95% increase in cloud exploitation from 2021 to 2022, with a staggering 288% jump in cases involving threat actors directly targeting the cloud.</p><p>Misconfigurations in cloud infrastructure settings, such as improperly set security parameters and default access controls, provide adversaries with an easy path to infiltrate the cloud. According to the <a href="https://cpl.thalesgroup.com/sites/default/files/content/cloud-security/2024/2024-thales-cloud-security-study-global-edition.pdf"><u>2023 Thales Global Cloud Security Study</u></a>, which surveyed nearly 3,000 IT and security professionals from 18 countries, 44% of respondents reported experiencing a data breach, with misconfigurations and human error identified as the leading cause, accounting for 31% of the incidents.</p><p>Further, according to Gartner<sup>Ⓡ</sup>, “Through 2027, 99% of records compromised in cloud environments will be the result of user misconfigurations and account compromise, not the result of an issue with the cloud provider.”<sup>1</sup></p><p>Several factors contribute to the rise of cloud misconfigurations:</p><ul><li><p><b>Rapid adoption of cloud services:</b> Leaders are often driven by the scalability, cost-efficiency, and ability to support remote work and real-time collaboration that cloud services offer. These factors enable rapid adoption of cloud services which can lead to unintentional misconfigurations as IT teams struggle to keep up with the pace and complexity of these services. </p></li><li><p><b>Complexity of cloud environments:</b> Cloud infrastructure can be highly complex with multiple services and configurations to manage. For example, <a href="https://public.docs.kivera.io/docs/access-analyzer"><u>AWS alone offers</u></a> 373 services with 15,617 actions and 140,000+ parameters, making it challenging for IT teams to manage settings accurately. </p></li><li><p><b>Decentralized management:</b> In large organizations, cloud infrastructure resources are often managed by multiple teams or departments. Without centralized oversight, inconsistent security policies and configurations can arise, increasing the risk of misconfigurations.</p></li><li><p><b>Continuous Integration and Continuous Deployment (CI/CD):</b> <a href="https://www.cloudflare.com/learning/serverless/glossary/what-is-ci-cd/">CI/CD pipelines</a> promote the ability to rapidly deploy, change and frequently update infrastructure. With this velocity comes the increased risk of misconfigurations when changes are not properly managed and reviewed.</p></li><li><p><b>Insufficient training and awareness:</b> Employees may lack the cross-functional skills needed for cloud security, such as understanding networks, identity, and service configurations. This knowledge gap can lead to mistakes and increases the risk of misconfigurations that compromise security.</p></li></ul>
    <div>
      <h3>Common exploitation methods </h3>
      <a href="#common-exploitation-methods">
        
      </a>
    </div>
    <p>Threat actors exploit cloud services through various means, including targeting misconfigurations, abusing privileges, and bypassing encryption. Misconfigurations such as exposed storage buckets or improperly secured APIs offer attackers easy access to sensitive data and resources. Privilege abuse occurs when attackers gain unauthorized access through compromised credentials or poorly managed identity and access management (IAM) policies, allowing them to escalate their access and move laterally within the cloud environment. Additionally, unencrypted data enables attackers to intercept and decrypt data in transit or at rest, further compromising the integrity and confidentiality of sensitive information.</p><p>Here are some other vulnerabilities that organizations should address: </p><ul><li><p><b>Unrestricted access to cloud tenants:</b> Allowing unrestricted access exposes cloud platforms to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">data exfiltration</a> by malicious actors. Limiting access to approved tenants with specific IP addresses and service destinations helps prevent unauthorized access.</p></li><li><p><b>Exposed access keys:</b> Exposed access keys can be exploited by unauthorized parties to steal or delete data. Requiring encryption for the access keys and restricting their usage can mitigate this risk.</p></li><li><p><b>Excessive account permissions:</b> Granting excessive privileges to cloud accounts increases the potential impact of security breaches. Limiting permissions to necessary operations helps prevent lateral movement and privilege escalation by threat actors.</p></li><li><p><b>Inadequate network segmentation:</b> Poorly managed network security groups and insufficient segmentation practices can allow attackers to move freely within cloud environments. Drawing boundaries around your cloud resources and tenants ensures that data stays within your organization.</p></li><li><p><b>Improper public access configuration:</b> Incorrectly exposing critical services or storage resources to the internet increases the likelihood of unauthorized access and data compromise. Preventing public access drastically reduces risk.</p></li><li><p><b>Shadow cloud infrastructure:</b> Abandoned or neglected cloud instances are often left vulnerable to exploitation, providing attackers with opportunities to access sensitive data left behind. Preventing untagged or unapproved cloud resources to be created can reduce the risk of exposure.</p></li></ul>
    <div>
      <h2>Limitations of existing tools </h2>
      <a href="#limitations-of-existing-tools">
        
      </a>
    </div>
    <p>Many organizations turn to CSPM tools to give them more visibility into cloud misconfigurations. These tools often alert teams after an issue occurs, putting security teams in a reactive mode. Remediation efforts require collaboration between security teams and developers to implement changes, which can be time-consuming and resource-intensive. This approach not only delays issue resolution but also exposes companies to compliance and legal risks, while failing to train employees on secure cloud practices. <a href="https://www.ibm.com/reports/data-breach-action-guide"><u>On average</u></a>, it takes 207 days to identify these breaches and an additional 70 days to contain them. </p><p>Addressing the growing threat of cloud misconfigurations requires proactive security measures and continuous monitoring. Organizations must adopt proactive security solutions that not only detect and alert but also prevent misconfigurations from occuring in the first place and enforce best practices. Creating a first line of defense for cloud deployment errors reduces the volume of alerts for customers, especially those also using CSPM tools or CNAPPs. </p><p>By implementing these proactive strategies, organizations can safeguard their cloud environments against the evolving landscape of cyber threats, ensuring robust security and compliance while minimizing risks and operational disruptions.</p>
    <div>
      <h2>What’s next for Kivera</h2>
      <a href="#whats-next-for-kivera">
        
      </a>
    </div>
    <p>The Kivera product will not be a point solution add-on. We’re making it a core part of our Cloudflare One offering because integrating features from products like our Secure Web Gateway give customers a comprehensive solution that works better together.</p><p>We’re excited to welcome Kivera to the Cloudflare team. Through the end of 2024 and into early 2025, Kivera’s team will focus on integrating their preventive inline cloud app controls directly into Cloudflare One. We are looking for early access testers and teams to provide feedback about what they would like to see. If you’d like early access, please <a href="https://www.cloudflare.com/lp/cloud-app-controls"><u>join the waitlist</u></a>.</p><p><sub>[1] Source: Outcome-Driven Metrics You Can Use to Evaluate Cloud Security Controls, Gartner, Charlie Winckless, Paul Proctor, Manuel Acosta, 09/28/2023 </sub></p><p><sub>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</sub></p><p>
</p> ]]></content:encoded>
            <category><![CDATA[Data Protection]]></category>
            <category><![CDATA[Acquisitions]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">6e7vmGCa8tZRTNJWqYs1di</guid>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Neil Brown</dc:creator>
            <dc:creator>Yumna Moazzam</dc:creator>
        </item>
        <item>
            <title><![CDATA[Disrupting FlyingYeti's campaign targeting Ukraine]]></title>
            <link>https://blog.cloudflare.com/disrupting-flyingyeti-campaign-targeting-ukraine/</link>
            <pubDate>Thu, 30 May 2024 13:00:38 GMT</pubDate>
            <description><![CDATA[ In April and May 2024, Cloudforce One employed proactive defense measures to successfully prevent Russia-aligned threat actor FlyingYeti from launching their latest phishing campaign targeting Ukraine ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and delay threat activity by the Russia-aligned threat actor FlyingYeti during their latest phishing campaign targeting Ukraine. At the onset of Russia’s invasion of Ukraine on February 24, 2022, Ukraine introduced a moratorium on evictions and termination of utility services for unpaid debt. The moratorium ended in January 2024, resulting in significant debt liability and increased financial stress for Ukrainian citizens. The FlyingYeti campaign capitalized on anxiety over the potential loss of access to housing and utilities by enticing targets to open malicious files via debt-themed lures. If opened, the files would result in infection with the PowerShell malware known as <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">COOKBOX</a>, allowing FlyingYeti to support follow-on objectives, such as installation of additional payloads and control over the victim’s system.</p><p>Since April 26, 2024, Cloudforce One has taken measures to prevent FlyingYeti from launching their phishing campaign – a campaign involving the use of Cloudflare Workers and GitHub, as well as exploitation of the WinRAR vulnerability <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831">CVE-2023-38831</a>. Our countermeasures included internal actions, such as detections and code takedowns, as well as external collaboration with third parties to remove the actor’s cloud-hosted malware. Our effectiveness against this actor prolonged their operational timeline from days to weeks. For example, in a single instance, FlyingYeti spent almost eight hours debugging their code as a result of our mitigations. By employing proactive defense measures, we successfully stopped this determined threat actor from achieving their objectives.</p>
    <div>
      <h3>Executive Summary</h3>
      <a href="#executive-summary">
        
      </a>
    </div>
    <ul><li><p>On April 18, 2024, Cloudforce One detected the Russia-aligned threat actor FlyingYeti preparing to launch a phishing espionage campaign targeting individuals in Ukraine.</p></li><li><p>We discovered the actor used similar tactics, techniques, and procedures (TTPs) as those detailed in <a href="https://cert.gov.ua/article/6278620">Ukranian CERT's article on UAC-0149</a>, a threat group that has primarily <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">targeted Ukrainian defense entities with COOKBOX malware since at least the fall of 2023</a>.</p></li><li><p>From mid-April to mid-May, we observed FlyingYeti conduct reconnaissance activity, create lure content for use in their phishing campaign, and develop various iterations of their malware. We assessed that the threat actor intended to launch their campaign in early May, likely following Orthodox Easter.</p></li><li><p>After several weeks of monitoring actor reconnaissance and weaponization activity (<a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Cyber Kill Chain Stages 1 and 2</a>), we successfully disrupted FlyingYeti’s operation moments after the final COOKBOX payload was built.</p></li><li><p>The payload included an exploit for the WinRAR vulnerability CVE-2023-38831, which FlyingYeti will likely continue to use in their phishing campaigns to infect targets with malware.</p></li><li><p>We offer steps users can take to defend themselves against FlyingYeti phishing operations, and also provide recommendations, detections, and indicators of compromise.</p></li></ul>
    <div>
      <h2>Who is FlyingYeti?</h2>
      <a href="#who-is-flyingyeti">
        
      </a>
    </div>
    <p>FlyingYeti is the <a href="https://www.merriam-webster.com/dictionary/cryptonym">cryptonym</a> given by <a href="/introducing-cloudforce-one-threat-operations-and-threat-research">Cloudforce One</a> to the threat group behind this phishing campaign, which overlaps with UAC-0149 activity tracked by <a href="https://cert.gov.ua/">CERT-UA</a> in <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">February</a> and <a href="https://cert.gov.ua/article/6278620">April</a> 2024. The threat actor uses dynamic DNS (<a href="https://www.cloudflare.com/learning/dns/glossary/dynamic-dns/">DDNS</a>) for their infrastructure and leverages cloud-based platforms for hosting malicious content and for malware command and control (C2). Our investigation of FlyingYeti TTPs suggests this is likely a Russia-aligned threat group. The actor appears to primarily focus on targeting Ukrainian military entities. Additionally, we observed Russian-language comments in FlyingYeti’s code, and the actor’s operational hours falling within the UTC+3 time zone.</p>
    <div>
      <h2>Campaign background</h2>
      <a href="#campaign-background">
        
      </a>
    </div>
    <p>In the days leading up to the start of the campaign, Cloudforce One observed FlyingYeti conducting reconnaissance on payment processes for Ukrainian communal housing and utility services:</p><ul><li><p>April 22, 2024 – research into changes made in 2016 that introduced the use of QR codes in payment notices</p></li><li><p>April 22, 2024 – research on current developments concerning housing and utility debt in Ukraine</p></li><li><p>April 25, 2024 – research on the legal basis for restructuring housing debt in Ukraine as well as debt involving utilities, such as gas and electricity</p></li></ul><p>Cloudforce One judges that the observed reconnaissance is likely due to the Ukrainian government’s payment moratorium introduced at the start of the full-fledged invasion in February 2022. Under this moratorium, outstanding debt would not lead to evictions or termination of provision of utility services. However, on January 9, 2024, the <a href="https://en.interfax.com.ua/news/economic/959388.html">government lifted this ban</a>, resulting in increased pressure on Ukrainian citizens with outstanding debt. FlyingYeti sought to capitalize on that pressure, leveraging debt restructuring and payment-related lures in an attempt to increase their chances of successfully targeting Ukrainian individuals.</p>
    <div>
      <h2>Analysis of the Komunalka-themed phishing site</h2>
      <a href="#analysis-of-the-komunalka-themed-phishing-site">
        
      </a>
    </div>
    <p>The disrupted phishing campaign would have directed FlyingYeti targets to an actor-controlled GitHub page at hxxps[:]//komunalka[.]github[.]io, which is a spoofed version of the Kyiv Komunalka communal housing site <a href="https://www.komunalka.ua">https://www.komunalka.ua</a>. Komunalka functions as a payment processor for residents in the Kyiv region and allows for payment of utilities, such as gas, electricity, telephone, and Internet. Additionally, users can pay other fees and fines, and even donate to Ukraine’s defense forces.</p><p>Based on past FlyingYeti operations, targets may be directed to the actor’s Github page via a link in a phishing email or an encrypted Signal message. If a target accesses the spoofed Komunalka platform at hxxps[:]//komunalka[.]github[.]io, the page displays a large green button with a prompt to download the document “Рахунок.docx” (“Invoice.docx”), as shown in Figure 1. This button masquerades as a link to an overdue payment invoice but actually results in the download of the malicious archive “Заборгованість по ЖКП.rar” (“Debt for housing and utility services.rar”).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22Rnm7YOnwnJocG98RMFDa/def10039081f7e9c6df15980a8b855ac/image4-5.png" />
            
            </figure><p>Figure 1: Prompt to download malicious archive “Заборгованість по ЖКП.rar”</p><p>A series of steps must take place for the download to successfully occur:</p><ul><li><p>The target clicks the green button on the actor’s GitHub page hxxps[:]//komunalka.github[.]io</p></li><li><p>The target’s device sends an HTTP POST request to the Cloudflare Worker worker-polished-union-f396[.]vqu89698[.]workers[.]dev with the HTTP request body set to “user=Iahhdr”</p></li><li><p>The Cloudflare Worker processes the request and evaluates the HTTP request body</p></li><li><p>If the request conditions are met, the Worker fetches the RAR file from hxxps[:]//raw[.]githubusercontent[.]com/kudoc8989/project/main/Заборгованість по ЖКП.rar, which is then downloaded on the target’s device</p></li></ul><p>Cloudforce One identified the infrastructure responsible for facilitating the download of the malicious RAR file and remediated the actor-associated Worker, preventing FlyingYeti from delivering its malicious tooling. In an effort to circumvent Cloudforce One's mitigation measures, FlyingYeti later changed their malware delivery method. Instead of the Workers domain fetching the malicious RAR file, it was loaded directly from GitHub.</p>
    <div>
      <h2>Analysis of the malicious RAR file</h2>
      <a href="#analysis-of-the-malicious-rar-file">
        
      </a>
    </div>
    <p>During remediation, Cloudforce One recovered the RAR file “Заборгованість по ЖКП.rar” and performed analysis of the malicious payload. The downloaded RAR archive contains multiple files, including a file with a name that contains the unicode character “U+201F”. This character appears as whitespace on Windows devices and can be used to “hide” file extensions by adding excessive whitespace between the filename and the file extension. As highlighted in blue in Figure 2, this cleverly named file within the RAR archive appears to be a PDF document but is actually a malicious CMD file (“Рахунок на оплату.pdf[unicode character U+201F].cmd”).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/55Vjmg9VLEnAFv3RZQoZ2l/866016a2489f2a6c780c9f3971dd28ca/image2-11.png" />
            
            </figure><p>Figure 2: Files contained in the malicious RAR archive “Заборгованість по ЖКП.rar” (“Housing Debt.rar”)</p><p>FlyingYeti included a benign PDF in the archive with the same name as the CMD file but without the unicode character, “Рахунок на оплату.pdf” (“Invoice for payment.pdf”). Additionally, the directory name for the archive once decompressed also contained the name “Рахунок на оплату.pdf”. This overlap in names of the benign PDF and the directory allows the actor to exploit the WinRAR vulnerability <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831">CVE-2023-38831</a>. More specifically, when an archive includes a benign file with the same name as the directory, the entire contents of the directory are opened by the WinRAR application, resulting in the execution of the malicious CMD. In other words, when the target believes they are opening the benign PDF “Рахунок на оплату.pdf”, the malicious CMD file is executed.</p><p>The CMD file contains the FlyingYeti PowerShell malware known as <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">COOKBOX</a>. The malware is designed to persist on a host, serving as a foothold in the infected device. Once installed, this variant of COOKBOX will make requests to the DDNS domain postdock[.]serveftp[.]com for C2, awaiting PowerShell <a href="https://learn.microsoft.com/en-us/powershell/scripting/powershell-commands?view=powershell-7.4">cmdlets</a> that the malware will subsequently run.</p><p>Alongside COOKBOX, several decoy documents are opened, which contain hidden tracking links using the <a href="https://canarytokens.com/generate">Canary Tokens</a> service. The first document, shown in Figure 3 below, poses as an agreement under which debt for housing and utility services will be restructured.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20vFV9kNTMmwxFXvpQoJTc/12542fb7a7d2108d49607f2a23fc7575/image5-10.png" />
            
            </figure><p>Figure 3: Decoy document Реструктуризація боргу за житлово комунальні послуги.docx</p><p>The second document (Figure 4) is a user agreement outlining the terms and conditions for the usage of the payment platform komunalka[.]ua.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VHSTwqfrXWXvoryg8lOcE/68eb096bc82f18c7edcb4c88c1ed6d2c/image3-6.png" />
            
            </figure><p>Figure 4: Decoy document Угода користувача.docx <i>(User Agreement.docx)</i></p><p>The use of relevant decoy documents as part of the phishing and delivery activity are likely an effort by FlyingYeti operators to increase the appearance of legitimacy of their activities.</p><p>The phishing theme we identified in this campaign is likely one of many themes leveraged by this actor in a larger operation to target Ukrainian entities, in particular their defense forces. In fact, the threat activity we detailed in this blog uses many of the same techniques outlined in a <a href="https://cert.gov.ua/article/6278620">recent FlyingYeti campaign</a> disclosed by CERT-UA in mid-April 2024, where the actor leveraged United Nations-themed lures involving Peace Support Operations to target Ukraine’s military. Due to Cloudforce One’s defensive actions covered in the next section, this latest FlyingYeti campaign was prevented as of the time of publication.</p>
    <div>
      <h2>Mitigating FlyingYeti activity</h2>
      <a href="#mitigating-flyingyeti-activity">
        
      </a>
    </div>
    <p>Cloudforce One mitigated FlyingYeti’s campaign through a series of actions. Each action was taken to increase the actor’s cost of continuing their operations. When assessing which action to take and why, we carefully weighed the pros and cons in order to provide an effective active defense strategy against this actor. Our general goal was to increase the amount of time the threat actor spent trying to develop and weaponize their campaign.</p><p>We were able to successfully extend the timeline of the threat actor’s operations from hours to weeks. At each interdiction point, we assessed the impact of our mitigation to ensure the actor would spend more time attempting to launch their campaign. Our mitigation measures disrupted the actor’s activity, in one instance resulting in eight additional hours spent on debugging code.</p><p>Due to our proactive defense efforts, FlyingYeti operators adapted their tactics multiple times in their attempts to launch the campaign. The actor originally intended to have the Cloudflare Worker fetch the malicious RAR file from GitHub. After Cloudforce One interdiction of the Worker, the actor attempted to create additional Workers via a new account. In response, we disabled all Workers, leading the actor to load the RAR file directly from GitHub. Cloudforce One notified GitHub, resulting in the takedown of the RAR file, the GitHub project, and suspension of the account used to host the RAR file. In return, FlyingYeti began testing the option to host the RAR file on the file sharing sites <a href="https://pixeldrain.com/">pixeldrain</a> and <a href="https://www.filemail.com/">Filemail</a>, where we observed the actor alternating the link on the Komunalka phishing site between the following:</p><ul><li><p>hxxps://pixeldrain[.]com/api/file/ZAJxwFFX?download=one</p></li><li><p>hxxps://1014.filemail[.]com/api/file/get?filekey=e_8S1HEnM5Rzhy_jpN6nL-GF4UAP533VrXzgXjxH1GzbVQZvmpFzrFA&amp;pk_vid=a3d82455433c8ad11715865826cf18f6</p></li></ul><p>We notified GitHub of the actor’s evolving tactics, and in response GitHub removed the Komunalka phishing site. After analyzing the files hosted on pixeldrain and Filemail, we determined the actor uploaded dummy payloads, likely to monitor access to their phishing infrastructure (FileMail logs IP addresses, and both file hosting sites provide view and download counts). At the time of publication, we did not observe FlyingYeti upload the malicious RAR file to either file hosting site, nor did we identify the use of alternative phishing or malware delivery methods.</p><p>A timeline of FlyingYeti’s activity and our corresponding mitigations can be found below.</p>
    <div>
      <h3>Event timeline</h3>
      <a href="#event-timeline">
        
      </a>
    </div>
    
<div><table><colgroup>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Date</span></th>
    <th><span>Event Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>2024-04-18 12:18</span></td>
    <td><span>Threat Actor (TA) creates a Worker to handle requests from a phishing site</span></td>
  </tr>
  <tr>
    <td><span>2024-04-18 14:16</span></td>
    <td><span>TA creates phishing site komunalka[.]github[.]io on GitHub</span></td>
  </tr>
  <tr>
    <td><span>2024-04-25 12:25</span></td>
    <td><span>TA creates a GitHub repo to host a RAR file</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 07:46</span></td>
    <td><span>TA updates the first Worker to handle requests from users visiting komunalka[.]github[.]io</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 08:24</span></td>
    <td><span>TA uploads a benign test RAR to the GitHub repo</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 13:38</span></td>
    <td><span>Cloudforce One identifies a Worker receiving requests from users visiting komunalka[.]github[.]io, observes its use as a phishing page</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 13:46</span></td>
    <td><span>Cloudforce One identifies that the Worker fetches a RAR file from GitHub (the malicious RAR payload is not yet hosted on the site)</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 19:22</span></td>
    <td><span>Cloudforce One creates a detection to identify the Worker that fetches the RAR</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 21:13</span></td>
    <td><span>Cloudforce One deploys real-time monitoring of the RAR file on GitHub</span></td>
  </tr>
  <tr>
    <td><span>2024-05-02 06:35</span></td>
    <td><span>TA deploys a weaponized RAR (CVE-2023-38831) to GitHub with their COOKBOX malware packaged in the archive</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 10:03</span></td>
    <td><span>TA attempts to update the Worker with link to weaponized RAR, the Worker is immediately blocked</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 10:38</span></td>
    <td><span>TA creates a new Worker, the Worker is immediately blocked</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:04</span></td>
    <td><span>TA creates a new account (#2) on Cloudflare</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:06</span></td>
    <td><span>TA creates a new Worker on account #2 (blocked)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:50</span></td>
    <td><span>TA creates a new Worker on account #2 (blocked)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 12:22</span></td>
    <td><span>TA creates a new modified Worker on account #2</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 16:05</span></td>
    <td><span>Cloudforce One disables the running Worker on account #2</span></td>
  </tr>
  <tr>
    <td><span>2024-05-07 22:16</span></td>
    <td><span>TA notices the Worker is blocked, ceases all operations</span></td>
  </tr>
  <tr>
    <td><span>2024-05-07 22:18</span></td>
    <td><span>TA deletes original Worker first created to fetch the RAR file from the GitHub phishing page</span></td>
  </tr>
  <tr>
    <td><span>2024-05-09 19:28</span></td>
    <td><span>Cloudforce One adds phishing page komunalka[.]github[.]io to real-time monitoring</span></td>
  </tr>
  <tr>
    <td><span>2024-05-13 07:36</span></td>
    <td><span>TA updates the github.io phishing site to point directly to the GitHub RAR link</span></td>
  </tr>
  <tr>
    <td><span>2024-05-13 17:47</span></td>
    <td><span>Cloudforce One adds COOKBOX C2 postdock[.]serveftp[.]com to real-time monitoring for DNS resolution</span></td>
  </tr>
  <tr>
    <td><span>2024-05-14 00:04</span></td>
    <td><span>Cloudforce One notifies GitHub to take down the RAR file</span></td>
  </tr>
  <tr>
    <td><span>2024-05-15 09:00</span></td>
    <td><span>GitHub user, project, and link for RAR are no longer accessible</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 08:23</span></td>
    <td><span>TA updates Komunalka phishing site on github.io to link to pixeldrain URL for dummy payload (pixeldrain only tracks view and download counts)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 08:25</span></td>
    <td><span>TA updates Komunalka phishing site to link to FileMail URL for dummy payload (FileMail tracks not only view and download counts, but also IP addresses)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 12:21</span></td>
    <td><span>Cloudforce One downloads PixelDrain document to evaluate payload</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 12:47</span></td>
    <td><span>Cloudforce One downloads FileMail document to evaluate payload</span></td>
  </tr>
  <tr>
    <td><span>2024-05-29 23:59</span></td>
    <td><span>GitHub takes down Komunalka phishing site</span></td>
  </tr>
  <tr>
    <td><span>2024-05-30 13:00</span></td>
    <td><span>Cloudforce One publishes the results of this investigation</span></td>
  </tr>
</tbody></table></div>
    <div>
      <h2>Coordinating our FlyingYeti response</h2>
      <a href="#coordinating-our-flyingyeti-response">
        
      </a>
    </div>
    <p>Cloudforce One leveraged industry relationships to provide advanced warning and to mitigate the actor’s activity. To further protect the intended targets from this phishing threat, Cloudforce One notified and collaborated closely with GitHub’s Threat Intelligence and Trust and Safety Teams. We also notified CERT-UA and Cloudflare industry partners such as CrowdStrike, Mandiant/Google Threat Intelligence, and Microsoft Threat Intelligence.</p>
    <div>
      <h3>Hunting FlyingYeti operations</h3>
      <a href="#hunting-flyingyeti-operations">
        
      </a>
    </div>
    <p>There are several ways to hunt FlyingYeti in your environment. These include using PowerShell to hunt for WinRAR files, deploying Microsoft Sentinel analytics rules, and running Splunk scripts as detailed below. Note that these detections may identify activity related to this threat, but may also trigger unrelated threat activity.</p>
    <div>
      <h3>PowerShell hunting</h3>
      <a href="#powershell-hunting">
        
      </a>
    </div>
    <p>Consider running a PowerShell script such as <a href="https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT/blob/main/hunt-script.ps1">this one</a> in your environment to identify exploitation of CVE-2023-38831. This script will interrogate WinRAR files for evidence of the exploit.</p>
            <pre><code>CVE-2023-38831
Description:winrar exploit detection 
open suspios (.tar / .zip / .rar) and run this script to check it 

function winrar-exploit-detect(){
$targetExtensions = @(".cmd" , ".ps1" , ".bat")
$tempDir = [System.Environment]::GetEnvironmentVariable("TEMP")
$dirsToCheck = Get-ChildItem -Path $tempDir -Directory -Filter "Rar*"
foreach ($dir in $dirsToCheck) {
    $files = Get-ChildItem -Path $dir.FullName -File
    foreach ($file in $files) {
        $fileName = $file.Name
        $fileExtension = [System.IO.Path]::GetExtension($fileName)
        if ($targetExtensions -contains $fileExtension) {
            $fileWithoutExtension = [System.IO.Path]::GetFileNameWithoutExtension($fileName); $filename.TrimEnd() -replace '\.$'
            $cmdFileName = "$fileWithoutExtension"
            $secondFile = Join-Path -Path $dir.FullName -ChildPath $cmdFileName
            
            if (Test-Path $secondFile -PathType Leaf) {
                Write-Host "[!] Suspicious pair detected "
                Write-Host "[*]  Original File:$($secondFile)" -ForegroundColor Green 
                Write-Host "[*] Suspicious File:$($file.FullName)" -ForegroundColor Red

                # Read and display the content of the command file
                $cmdFileContent = Get-Content -Path $($file.FullName)
                Write-Host "[+] Command File Content:$cmdFileContent"
            }
        }
    }
}
}
winrar-exploit-detect</code></pre>
            
    <div>
      <h3></h3>
      <a href="#">
        
      </a>
    </div>
    <p>Microsoft Sentinel</p><p>In Microsoft Sentinel, consider deploying the rule provided below, which identifies WinRAR execution via cmd.exe. Results generated by this rule may be indicative of attack activity on the endpoint and should be analyzed.</p>
            <pre><code>DeviceProcessEvents
| where InitiatingProcessParentFileName has @"winrar.exe"
| where InitiatingProcessFileName has @"cmd.exe"
| project Timestamp, DeviceName, FileName, FolderPath, ProcessCommandLine, AccountName
| sort by Timestamp desc</code></pre>
            
    <div>
      <h3></h3>
      <a href="#">
        
      </a>
    </div>
    <p>Splunk</p><p>Consider using <a href="https://research.splunk.com/endpoint/d2f36034-37fa-4bd4-8801-26807c15540f/">this script</a> in your Splunk environment to look for WinRAR CVE-2023-38831 execution on your Microsoft endpoints. Results generated by this script may be indicative of attack activity on the endpoint and should be analyzed.</p>
            <pre><code>| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.parent_process_name=winrar.exe `windows_shells` OR Processes.process_name IN ("certutil.exe","mshta.exe","bitsadmin.exe") by Processes.dest Processes.user Processes.parent_process_name Processes.parent_process Processes.process_name Processes.process Processes.process_id Processes.parent_process_id 
| `drop_dm_object_name(Processes)` 
| `security_content_ctime(firstTime)` 
| `security_content_ctime(lastTime)` 
| `winrar_spawning_shell_application_filter`</code></pre>
            
    <div>
      <h2>Cloudflare product detections</h2>
      <a href="#cloudflare-product-detections">
        
      </a>
    </div>
    
    <div>
      <h3>Cloudflare Email Security</h3>
      <a href="#cloudflare-email-security">
        
      </a>
    </div>
    <p>Cloudflare Email Security (CES) customers can identify FlyingYeti threat activity with the following detections.</p><ul><li><p>CVE-2023-38831</p></li><li><p>FLYINGYETI.COOKBOX</p></li><li><p>FLYINGYETI.COOKBOX.Launcher</p></li><li><p>FLYINGYETI.Rar</p></li></ul>
    <div>
      <h2>Recommendations</h2>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>Cloudflare recommends taking the following steps to mitigate this type of activity:</p><ul><li><p>Implement Zero Trust architecture foundations:    </p></li><li><p>Deploy Cloud Email Security to ensure that email services are protected against phishing, BEC and other threats</p></li><li><p>Leverage browser isolation to separate messaging applications like LinkedIn, email, and Signal from your main network</p></li><li><p>Scan, monitor and/or enforce controls on specific or sensitive data moving through your network environment with data loss prevention policies</p></li><li><p>Ensure your systems have the latest WinRAR and Microsoft security updates installed</p></li><li><p>Consider preventing WinRAR files from entering your environment, both at your Cloud Email Security solution and your Internet Traffic Gateway</p></li><li><p>Run an Endpoint Detection and Response (EDR) tool such as CrowdStrike or Microsoft Defender for Endpoint to get visibility into binary execution on hosts</p></li><li><p>Search your environment for the FlyingYeti indicators of compromise (IOCs) shown below to identify potential actor activity within your network.</p></li></ul><p>If you’re looking to uncover additional Threat Intelligence insights for your organization or need bespoke Threat Intelligence information for an incident, consider engaging with Cloudforce One by contacting your Customer Success manager or filling out <a href="https://www.cloudflare.com/zero-trust/lp/cloudforce-one-threat-intel-subscription/">this form</a>.</p>
    <div>
      <h2>Indicators of Compromise</h2>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    
<div><table><colgroup>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Domain / URL</span></th>
    <th><span>Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>komunalka[.]github[.]io</span></td>
    <td><span>Phishing page</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//github[.]com/komunalka/komunalka[.]github[.]io</span></td>
    <td><span>Phishing page</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//worker-polished-union-f396[.]vqu89698[.]workers[.]dev</span></td>
    <td><span>Worker that fetches malicious RAR file</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//raw[.]githubusercontent[.]com/kudoc8989/project/main/Заборгованість по ЖКП.rar</span></td>
    <td><span>Delivery of malicious RAR file</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//1014[.]filemail[.]com/api/file/get?filekey=e_8S1HEnM5Rzhy_jpN6nL-GF4UAP533VrXzgXjxH1GzbVQZvmpFzrFA&amp;pk_vid=a3d82455433c8ad11715865826cf18f6</span></td>
    <td><span>Dummy payload</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//pixeldrain[.]com/api/file/ZAJxwFFX?download=</span></td>
    <td><span>Dummy payload</span></td>
  </tr>
  <tr>
    <td><span>hxxp[:]//canarytokens[.]com/stuff/tags/ni1cknk2yq3xfcw2al3efs37m/payments.js</span></td>
    <td><span>Tracking link</span></td>
  </tr>
  <tr>
    <td><span>hxxp[:]//canarytokens[.]com/stuff/terms/images/k22r2dnjrvjsme8680ojf5ccs/index.html</span></td>
    <td><span>Tracking link</span></td>
  </tr>
  <tr>
    <td><span>postdock[.]serveftp[.]com</span></td>
    <td><span>COOKBOX C2</span></td>
  </tr>
</tbody></table></div> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[CVE]]></category>
            <category><![CDATA[Exploit]]></category>
            <category><![CDATA[GitHub]]></category>
            <category><![CDATA[Intrusion Detection]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Microsoft]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Serverless]]></category>
            <category><![CDATA[Threat Data]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Threat Operations]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">5JO10nXN3tLVG2C1EttkiH</guid>
            <dc:creator>Cloudforce One</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare Cloud Email Security protects against the evolving threat of QR phishing]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-cloud-email-security-protects-against-the-evolving-threat-of-qr-phishing/</link>
            <pubDate>Wed, 17 Apr 2024 13:00:44 GMT</pubDate>
            <description><![CDATA[ Learn about how Cloudflare's Cloud Email Security tackles QR phishing, why attackers favor QR codes, and Cloudflare's proactive defense strategy against evolving threats ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vqiqKMC9TcbN2grgE4JNX/bde05e055953c24da09e4bf4f0194324/image12-1.png" />
            
            </figure><p>In the ever-evolving landscape of cyber threats, a subtle yet potent form of phishing has emerged — <a href="https://www.cloudflare.com/learning/security/what-is-quishing/">quishing</a>, short for QR phishing. It has been <a href="https://www.microsoft.com/en-us/microsoft-365-life-hacks/privacy-and-safety/brief-history-qr-codes">30 years since the invention of QR codes</a>, yet quishing still poses a significant risk, especially after the era of COVID, when QR codes became the norm to check statuses, register for events, and even order food.</p><p>Since 2020, <a href="https://developers.cloudflare.com/email-security/">Cloudflare’s cloud email security solution (previously known as Area 1)</a> has been at the forefront of fighting against quishing attacks, taking a proactive stance in dissecting them to better protect our customers. Let’s delve into the mechanisms behind QR phishing, explore why QR codes are a preferred tool for attackers, and review how Cloudflare contributes to the fight against this evolving threat.</p>
    <div>
      <h2>How quishing works</h2>
      <a href="#how-quishing-works">
        
      </a>
    </div>
    <p>The impact of phishing and quishing are quite similar, as both can result in users having their credentials compromised, devices compromised, or even financial loss. They also leverage malicious attachments or websites to provide bad actors the ability to access something they normally wouldn’t be able to. Where they differ is that quishing is typically highly targeted and uses a QR code to further obfuscate itself from detection.</p><p>Since phish detection engines require inputs like URLs or attachments inside an email in order to detect, quish succeeds by hampering the detection of these inputs. In Example A below, the phish’s URL was crawled and after two redirects landed on a malicious website that automatically tries to run key logging malware that copies login names and passwords. For Example A, this clearly sets off the detectors, but Example B has no link to crawl and therefore the same detections that worked on Example A are rendered inert.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jABZ5PmTIPdOp78Kaq5ZH/e9c93303b5187c80a31d7a41901e1f85/Screenshot-2024-04-16-at-13.33.49.png" />
            
            </figure><p>Strange you say, if my phone can scan that QR code then can’t a detection engine recognize the QR code as well? Simply put, no, because phish detection engines are optimized for catching phish, but to identify and scan QR codes requires a completely different engine – a computer vision engine. This brings us to why QR codes are a preferred tool for attackers.</p>
    <div>
      <h2>Why QR codes for phishing?</h2>
      <a href="#why-qr-codes-for-phishing">
        
      </a>
    </div>
    <p>There are three main reasons QR codes are popular in <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing attacks</a>. First, QR codes boast strong error correction capabilities, allowing them to withstand resizing, pixel shifting, variations in lighting, partial cropping, and other distortions. Indeed, computer vision models can scan QR codes, but identifying which section of an email, image, or webpage linked in an email has a QR code is quite difficult for a machine, and even more so if the QR codes have been obfuscated to hide themselves from some computer vision models. For example, by inverting them, blending them with other colors or images, or making them extremely small, computer vision models will have trouble even identifying the presence of QR codes, much less even being able to scan them. Though filters and additional processing can be applied to any image, not knowing what or where to apply makes the deobfuscation of a QR code an extremely expensive computational problem. This not only makes catching all quish hard, but is likely to cause frustration for an end user who won’t get their emails quickly because an image or blob of text looks similar to a QR code, resulting in delivery delays.</p><p>Even though computer vision models may have difficulty deobfuscating QR codes, we have discovered from experience that when a human encounters these obfuscated QR codes, with enough time and effort, they are usually able to scan the QR code. By doing everything from increasing the brightness of their screen, to printing out the email, to resizing the codes themselves, they can make a QR code that has been hidden from machines scan successfully.</p><p><i>Don’t believe us? Try it for yourself with the QR codes that have been obfuscated for machines. They all link to</i> <a href="/"><i>https://blog.cloudflare.com/</i></a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1q4lolcNSXKWznwHGZMIFh/5e43d3d517b9c7eedf5afe6a9f5b11c3/Screenshot-2024-04-16-at-13.35.32.png" />
            
            </figure><p><i>(</i><a href="https://www.freepik.com/free-photo/old-textured-brick-wall-background_18998169.htm#query=brick%20wall&amp;position=0&amp;from_view=keyword&amp;track=ais&amp;uuid=5fc175de-b992-4443-aad7-730f83770fbb"><i>Brick wall image by rawpixel.com on Freepik</i></a><i>)</i></p><p>If you scanned any of the example QR codes above, you have just proven the next reason bad actors favor quish. The devices used for accessing QR codes are typically personal devices with a limited security posture, making them susceptible to exploitation. While secured corporate devices typically have measures to warn, stop, or sandbox users when they access malicious links, these protections are not available natively on personal devices. This can be especially worrisome, as we have seen a trend towards custom QR codes targeting executives in organizations.</p><p>QR codes can also be seamlessly layered in with other obfuscation techniques, such as encrypted attachments, mirrors that mimic well-known websites, validations to prove you are human before malicious content is revealed, and more. This versatility makes them an attractive choice for cybercriminals seeking innovative ways to deceive unsuspecting users by adding QR codes to previously successful phishing vectors that have now been blocked by security products.</p>
    <div>
      <h2>Cloudflare's protection strategy</h2>
      <a href="#cloudflares-protection-strategy">
        
      </a>
    </div>
    <p>Cloudflare has been at the forefront of defending against quishing attacks. We employ a multi-faceted approach, and instead of focusing on archaic, layered email configuration rules, we have trained our machine learning (ML) detection models on almost a decade’s worth of detection data and have a swath of proactive computer vision models to ensure all of our customers start with a turnkey solution.</p><p>For quish detections, we break it into two parts: 1) identification and scanning of QR codes 2) analysis of decoded QR codes.</p><p>The first part is solved by our own QR code detection heuristics that inform how, when, and where for our computer vision models to execute. We then leverage the newest libraries and tools to help identify, process, and most importantly decode QR codes. While it is relatively easy for a human to identify a QR code, there is almost no limit to how many ways they can be obfuscated to machines. The examples we provided above are just a small sample of what we’ve seen in the wild, and bad actors are constantly discovering new methods to make QR codes hard to quickly find and identify, making it a constant cat and mouse game that requires us to regularly update our tools for the trending obfuscation technique.</p><p>The second part, analysis of decoded QR codes, goes through all the same treatment we apply to phish and then some. We have engines that deconstruct complex URLs and drill down to the final URL, from redirect to redirect, whether they are automatic or not. Along the way, we scan for malicious attachments and malicious websites and log findings for future detections to cross-reference. If we encounter any files or content that are encrypted or password protected, we leverage another group of engines that attempt to decrypt and unprotect them, so we can identify if there was any obfuscated malicious content. Most importantly, with all of this information, we continuously update our databases with this new data, including the obfuscation of the QR code, to make better assessments of similar attacks that leverage the methods we have documented.</p><p>However, even with a well-trained suite of phish detection tools, quite often the malicious content is at the end of a long chain of redirects that prevent automated web crawlers from identifying anything at all, much less malicious content. In between redirects, there might be a hard block that requires human validation, such as a <a href="https://www.cloudflare.com/learning/bots/how-captchas-work/">CAPTCHA</a>, which makes it virtually impossible for an automated process to crawl past, and therefore unable to classify any content at all. Or there might be a conditional block with campaign identification requirements, so if anyone is outside the original target’s region or has a web browser and operating system version that doesn’t meet the campaign requirements, they would simply view a benign website, while the target would be exposed to the malicious content. Over the years, we have built tools to identify and pass these validations, so we can determine malicious content that may be there.</p><p>However, even with all the technologies we’ve built over the years, there are cases where we aren’t able to easily get to the final content. In those cases, our link reputation machine learning models, which have been trained on multiple years of scanned links and their metadata, have proven to be quite valuable and are easily applied after QR codes are decoded as well. By correlating things like domain metadata, URL structure, URL query strings, and our own historical data sets, we are able to make inferences to protect our customers. We also take a proactive approach and leverage our ML models to tell us where to hunt for QR codes, even if they aren’t immediately obvious, and by scrutinizing domains, sentiment, context, IP addresses, historical use, and social patterns between senders and recipients, Cloudflare identifies and neutralizes potential threats before they can inflict harm.</p>
    <div>
      <h2>Creative examples and real world instances</h2>
      <a href="#creative-examples-and-real-world-instances">
        
      </a>
    </div>
    <p>With the thousands of QR codes we process daily, we see some interesting trends. Notable companies, including Microsoft and DocuSign, have frequently been the subjects of impersonation for quishing attacks. What makes this more confusing for users, and even more likely to scam them, is that these companies actually use QR codes in their legitimate workflows. This further underscores the urgency for organizations to fortify their defenses against this evolving threat.</p><p>Below are three examples of the most interesting quish we have found and compared against the real use cases by the respective companies. The QR codes used in these emails have been masked.</p>
    <div>
      <h3>Microsoft Authenticator</h3>
      <a href="#microsoft-authenticator">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/26vhSfHns8YkKs1DtB1p9n/3b39f16fb2feeab377679ad1466f5084/Screenshot-2024-04-16-at-13.37.12.png" />
            
            </figure><p>Microsoft uses QR codes as a faster way to complete <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/">MFA</a> instead of sending six digit SMS codes to users’ phones that can be delayed and are also considered safer, as SMS MFA can be intercepted through SIM swap attacks. Users would have independently registered their devices and would have previously seen the registration screen on the right, so receiving an email that says they need to re-authenticate doesn’t seem especially odd.</p>
    <div>
      <h3>DocuSign</h3>
      <a href="#docusign">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/167XX59i4v1Im47dNhjxUm/adc13cc6a4aba177c1d009e18567ad30/Screenshot-2024-04-16-at-13.38.14.png" />
            
            </figure><p>DocuSign uses QR codes to make it easier for users to download their mobile app tosign documents, <a href="https://support.docusign.com/s/document-item?language=en_US&amp;bundleId=ced1643229641057&amp;topicId=iww1578456547699.html&amp;_LANG=enus">identity verification</a> via a mobile device to take photos, and supports embedding DocuSign features in <a href="https://support.docusign.com/s/document-item?language=en_US&amp;rsc_301=&amp;bundleId=yca1573855023892&amp;topicId=xhc1615577299246.html&amp;_LANG=enus">third party apps</a> which have their own QR code scanning functionality. The use of QR codes in native DocuSign apps and non-native apps makes it confusing for frequent DocuSign users and not at all peculiar for users that rarely use DocuSign. While the QR code for downloading the DocuSign app is not used in signature requests, to a frequent user, it might just seem like a fast method to open the request in the app they already have downloaded on their mobile device.</p>
    <div>
      <h3>Microsoft Teams</h3>
      <a href="#microsoft-teams">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7j7KenKXtrmjJlNnHBPy2O/40cc68d61e198e8181fa4ccf6f12ecb4/Screenshot-2024-04-16-at-13.38.53.png" />
            
            </figure><p>Microsoft uses QR codes for Teams to allow users to quickly join a team via a mobile device, and while Teams doesn’t use QR codes for voicemails, it does have a voicemail feature. The email on the left seems like a reminder to check voicemail in Teams and combines the two real use cases on the right.</p>
    <div>
      <h2>How you can help prevent quishing</h2>
      <a href="#how-you-can-help-prevent-quishing">
        
      </a>
    </div>
    <p>As we confront the persistent threat of quishing, it's crucial for individuals and organizations to be vigilant.  While no solution can guarantee 100% protection, collective diligence can significantly reduce the risk, and we encourage collaboration in the fight against quishing.</p><p>If you are already a Cloud Email Security customer, we remind you to <a href="https://developers.cloudflare.com/email-security/email-configuration/phish-submissions/">submit instances</a> of quish from within our portal to help stop current threats and enhance the capabilities of future machine learning models, leading to more proactive defense strategies. If you aren’t a customer, you can still submit original quish samples as an attachment in <a href="https://docs.fileformat.com/email/eml/">EML</a> format to <a>quish@cloudflare.com</a>, and remember to leverage your email security provider’s submission process to inform them of these quishing vectors as well.</p><p>The battle against quishing is ongoing, requiring continuous innovation and collaboration. To support submissions of quish, we are developing new methods for customers to provide targeted feedback to our models and also adding additional transparency to our metrics to facilitate tracking a variety of vectors, including quish.</p> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">4U4At0ve95ZFEqtwjjVm10</guid>
            <dc:creator>Pete Pang</dc:creator>
        </item>
        <item>
            <title><![CDATA[From .com to .beauty: The evolving threat landscape of unwanted email]]></title>
            <link>https://blog.cloudflare.com/top-level-domains-email-phishing-threats/</link>
            <pubDate>Tue, 26 Mar 2024 13:00:20 GMT</pubDate>
            <description><![CDATA[ In this 2023-early 2024 email analysis, we examine how certain generic Top-Level Domains (TLDs) are primarily used for spam and phishing, and their evolution over a year. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6llbY6RiwuM9hAX813Fkc3/6ec382a3027d32f79b6e0cbda61647d9/A-Highest-email-threat-Top-Level-Domains.png" />
            
            </figure><p>You're browsing your inbox and spot an email that looks like it's from a brand you trust. Yet, something feels off. This might be a phishing attempt, a common tactic where cybercriminals impersonate reputable entities — we've written about the <a href="/50-most-impersonated-brands-protect-phishing">top 50 most impersonated brands</a> used in phishing attacks. One factor that can be used to help evaluate the email's legitimacy is its Top-Level Domain (<a href="https://www.cloudflare.com/learning/dns/top-level-domain/">TLD</a>) — the part of the email address that comes after the dot.</p><p>In this analysis, we focus on the TLDs responsible for a significant share of malicious or spam emails since January 2023. For the purposes of this blog post, we are considering malicious email messages to be equivalent to phishing attempts. With an average of 9% of 2023's emails processed by Cloudflare’s Cloud Email Security service marked as spam and 3% as malicious, rising to 4% by year-end, we aim to identify trends and signal which TLDs have become more dubious over time. Keep in mind that our measurements represent where we observe data across the email delivery flow. In some cases, we may be observing after initial filtering has taken place, at a point where missed classifications are likely to cause more damage. This information derived from this analysis could serve as a guide for Internet users, corporations, and geeks like us, searching for clues, as Internet detectives, in identifying potential threats. To make this data readily accessible, <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, our tool for Internet insights, now <a href="/email-security-insights-on-cloudflare-radar">includes a new section</a> dedicated to email security trends.</p><p>Cyber attacks often leverage the guise of authenticity, a tactic <a href="/2022-07-sms-phishing-attacks">Cloudflare thwarted</a> following a phishing scheme similar to the one that compromised Twilio in 2022. The US Cybersecurity and Infrastructure Security Agency (<a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>) notes that 90% of cyber attacks start with phishing, and fabricating trust is a key component of successful malicious attacks. We see there are two forms of authenticity that attackers can choose to leverage when crafting phishing messages, visual and organizational. Attacks that leverage visual authenticity rely on attackers using branding elements, like logos or images, to build credibility. Organizationally authentic campaigns rely on attackers using previously established relationships and business dynamics to establish trust and be successful.</p><p>Our findings from 2023 reveal that recently introduced generic TLDs (<a href="https://icannwiki.org/Generic_top-level_domain">gTLDs</a>), including several linked to the <a href="https://www.prnewswire.com/news-releases/domain-makeovers-begin-with-beauty-hair-skin-and-makeup-301182816.html">beauty industry</a>, are predominantly used both for spam and malicious attacks. These TLDs, such as .uno, .sbs, and .beauty, all introduced since 2014, have seen over 95% of their emails flagged as spam or malicious. Also, it's important to note that in terms of volume, “.com” accounts for 67% of all spam and malicious emails (more on that below).</p><table><colgroup><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>TLDs</span></p></td><td><p><span>2023 Spam %</span></p></td><td><p><span>2023 Malicious %</span></p></td><td><p><span>2023 Spam + malicious %</span></p></td><td><p><span>TLD creation</span></p></td></tr><tr><td><p><span>.uno</span></p></td><td><p><span>62%</span></p></td><td><p><span>37%</span></p></td><td><p><span>99%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.sbs</span></p></td><td><p><span>64%</span></p></td><td><p><span>35%</span></p></td><td><p><span>98%</span></p></td><td><p><span>2021</span></p></td></tr><tr><td><p><span>.best</span></p></td><td><p><span>68%</span></p></td><td><p><span>29%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.beauty</span></p></td><td><p><span>77%</span></p></td><td><p><span>20%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2021</span></p></td></tr><tr><td><p><span>.top</span></p></td><td><p><span>74%</span></p></td><td><p><span>23%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.hair</span></p></td><td><p><span>78%</span></p></td><td><p><span>18%</span></p></td><td><p><span>97%</span></p></td><td><p><span>2021</span></p></td></tr><tr><td><p><span>.monster</span></p></td><td><p><span>80%</span></p></td><td><p><span>17%</span></p></td><td><p><span>96%</span></p></td><td><p><span>2019</span></p></td></tr><tr><td><p><span>.cyou</span></p></td><td><p><span>34%</span></p></td><td><p><span>62%</span></p></td><td><p><span>96%</span></p></td><td><p><span>2020</span></p></td></tr><tr><td><p><span>.wiki</span></p></td><td><p><span>69%</span></p></td><td><p><span>26%</span></p></td><td><p><span>95%</span></p></td><td><p><span>2014</span></p></td></tr><tr><td><p><span>.makeup</span></p></td><td><p><span>32%</span></p></td><td><p><span>63%</span></p></td><td><p><span>95%</span></p></td><td><p><span>2021</span></p></td></tr></tbody></table>
    <div>
      <h2>Email and Top-Level Domains history</h2>
      <a href="#email-and-top-level-domains-history">
        
      </a>
    </div>
    <p>In 1971, <a href="https://web.archive.org/web/20140209064041/http://openmap.bbn.com/~tomlinso/ray/firstemailframe.html">Ray Tomlinson</a> sent the first networked email over <a href="https://en.wikipedia.org/wiki/ARPANET">ARPANET</a>, using the @ character in the address. Five decades later, email remains relevant but also a key entry point for attackers.</p><p>Before the advent of the World Wide Web, email standardization and growth in the 1980s, especially within academia and military communities, led to interoperability. Fast forward 40 years, and this interoperability is once again a hot topic, with platforms like Threads, Mastodon, and other social media services aiming for the open communication that Jack Dorsey envisioned for Twitter. So, in 2024, it's clear that social media, messaging apps like Slack, Teams, Google Chat, and others haven't killed email, just as “video didn’t kill the <a href="https://en.wikipedia.org/wiki/Video_Killed_the_Radio_Star">radio star</a>.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ASRLNx8eaExAQ0EPDrJPi/f27726ec53a5697eb9d58202828837b9/blogcfcom.png" />
            
            </figure><p>The structure of a domain name.</p><p>The domain name system, managed by ICANN, encompasses a variety of TLDs, from the classic “.<a href="https://en.wikipedia.org/wiki/.com">com</a>” (1985) to the newer generic options. There are also the country-specific (<a href="https://en.wikipedia.org/wiki/Country_code_top-level_domain">ccTLDs</a>), where the Internet Assigned Numbers Authority (<a href="https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority">IANA</a>) <a href="https://icannwiki.org/Country_code_top-level_domain#ccTLDs_and_ICANN">is responsible</a> for determining an appropriate trustee for each ccTLD. An extensive 2014 expansion by <a href="https://newgtlds.icann.org/en/about">ICANN</a> was designed to "increase competition and choice in the domain name space," introducing numerous new options for specific professional, business, and informational purposes, which in turn, also opened up new possibilities for phishing attempts.</p>
    <div>
      <h2>3.4 billion unwanted emails</h2>
      <a href="#3-4-billion-unwanted-emails">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloud Email Security</a> service is helping protect our customers, and that also comes with insights. In 2022, Cloudflare blocked 2.4 billion unwanted emails, and in 2023 that number rose to over 3.4 billion unwanted emails, 26% of all messages processed. This total includes spam, malicious, and "<a href="https://en.wikipedia.org/wiki/Bulk_email_software">bulk</a>" (practice of sending a single email message, unsolicited or solicited, to a large number of recipients simultaneously) emails. That means an average of 9.3 million per day, 6500 per minute, 108 per second.</p><p>Bear in mind that new customers also make the numbers grow — in this case, driving a 42% increase in unwanted emails from 2022 to 2023. But this gives a sense of scale in this email area. Those unwanted emails can include malicious attacks that are difficult to detect, becoming more frequent, and can have devastating consequences for individuals and businesses that fall victim to them. Below, we’ll give more details on email threats, where malicious messages account for almost 3% of emails averaged across all of 2023 and it shows a growth tendency during the year, with higher percentages in the last months of the year. Let's take a closer look.</p>
    <div>
      <h2>Top phishing TLDs (and types of TLDs)</h2>
      <a href="#top-phishing-tlds-and-types-of-tlds">
        
      </a>
    </div>
    <p>First, let’s start with an 2023 overview of <a href="https://www.cloudflare.com/learning/dns/top-level-domain/">top level domains</a> with a high percentage of spam and malicious messages. Despite excluding TLDs with fewer than 20,000 emails, our analysis covers unwanted emails considered to be spam and malicious from more than 350 different TLDs (and yes, there are <a href="https://www.iana.org/domains/root/db">many more</a>).</p><p>A quick overview highlights the TLDs with the highest rates of spam and malicious attacks as a proportion of their outbound email, those with the largest volume share of spam or malicious emails, and those with the highest rates of just-malicious and just-spam TLD senders. It reveals that newer TLDs, especially those associated with the beauty industry (generally <a href="https://www.prnewswire.com/news-releases/domain-makeovers-begin-with-beauty-hair-skin-and-makeup-301182816.html">available since 2021 and serving a booming industry</a>), have the highest rates as a proportion of their emails. However, it's relevant to recognize that “.com” accounts for 67% of all spam and malicious emails. Malicious emails often originate from recently created generic TLDs like “.bar”, “.makeup”, or “.cyou”, as well as certain country-code TLDs (ccTLDs) employed beyond their geographical implications.</p><p></p><p>Focusing on volume share, “.com” dominates the spam + malicious list at 67%, and is joined in the top 3 by another “classic” gTLD, “.net”, at 4%. They also lead by volume when we look separately at the malicious (68% of all malicious emails are “.com” and “.net”) and spam (71%) categories, as shown below. All of the generic TLDs introduced since 2014 represent 13.4% of spam and malicious and over 14% of only malicious emails. These new TLDs (most of them are only available since 2016) are notable sources of both spam and malicious messages. Meanwhile, country-code TLDs contribute to more than 12% of both categories of unwanted emails.</p><p>This breakdown highlights the critical role of both established and new generic TLDs, which surpass older ccTLDs in terms of malicious emails, pointing to the changing dynamics of email-based threats.</p><table><colgroup><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Type of TLDs</span></p></td><td><p><span>Spam</span></p></td><td><p><span>Malicious </span></p></td><td><p><span>Spam + malicious</span></p></td></tr><tr><td><p><span>ccTLDs</span></p></td><td><p><span>13%</span></p></td><td><p><span>12%</span></p></td><td><p><span>12%</span></p></td></tr><tr><td><p><span>.com and .net only</span></p></td><td><p><span>71%</span></p></td><td><p><span>68%</span></p></td><td><p><span>71%</span></p></td></tr><tr><td><p><span>new gTLDs </span></p></td><td><p><span>13%</span></p></td><td><p><span>14%</span></p></td><td><p><span>13.4%</span></p></td></tr></tbody></table><p>That said, “.shop” deserves a highlight of its own. The TLD, which has been available <a href="https://en.wikipedia.org/wiki/.shop">since 2016</a>, is #2 by volume of spam and malicious emails, accounting for 5% of all of those emails. It also represents, when we separate those two categories, 5% of all malicious emails, and 5% of all spam emails. As we’re going to see below, its influence is growing.</p>
    <div>
      <h2>Full 2023 top 50 spam &amp; malicious TLDs list</h2>
      <a href="#full-2023-top-50-spam-malicious-tlds-list">
        
      </a>
    </div>
    <p>For a more detailed perspective, below we present the top 50 TLDs with the highest percentages of spam and malicious emails during 2023. We also include a breakdown of those two categories.</p><p>It’s noticeable that even outside the top 10, other recent generic TLDs are also higher in the ranking, such as “.autos” (the #1 in the spam list), “.today”, “.bid” or “.cam”. TLDs that seem to promise entertainment or fun or are just leisure or recreational related (including “.fun” itself), occupy a position in our top 50 ranking.</p><p></p>
    <div>
      <h2>Change in spam &amp; malicious TLD patterns</h2>
      <a href="#change-in-spam-malicious-tld-patterns">
        
      </a>
    </div>
    <p>Let's look at TLDs where spam + malicious emails comprised the largest share of total messages from that TLD, and how that list of TLDs changed from the first half of 2023 to the second half. This shows which TLDs were most problematic at different times during the year.</p><p>Highlighted in <b>bold</b> in the following table are those TLDs that climbed in the rankings for the percentage of spam and malicious emails from July to December 2023, compared with January to June. Generic TLDs “.uno”, “.makeup” and “.directory” appeared in the top list and in higher positions for the first time in the last six months of the year.</p><p></p><p>From the rankings, it's clear that the recent generic TLDs have the highest spam and malicious percentage of all emails. The top 10 TLDs in both halves of 2023 are all recent and generic, with several introduced since 2021.</p><p>Reasons for the prominence of these gTLDs include the availability of <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> that can seem legitimate or mimic well-known brands, as we explain in this <a href="/50-most-impersonated-brands-protect-phishing">blog post</a>. Cybercriminals often use popular or catchy words. Some gTLDs allow anonymous registration. Their low cost and the delay in updated security systems to recognize new gTLDs as spam and malicious sources also play a role — note that, as we’ve seen, cyber criminals also like to change TLDs and methods.</p>
    <div>
      <h2>The impact of a lawsuit?</h2>
      <a href="#the-impact-of-a-lawsuit">
        
      </a>
    </div>
    <p>There's also been a change in the types of domains with the highest malicious percentage in 2023, possibly due to Meta's <a href="https://krebsonsecurity.com/2023/05/phishing-domains-tanked-after-meta-sued-freenom/?cf_target_id=C13ADC4DD499FF8D0CEE849D9B49B413">lawsuit</a> against Freenom, filed in December 2022 and refiled in March 2023. Freenom provided domain name registry services for free in five ccTLDs, which wound up being used for purposes beyond local businesses or content: “.cf” (Central African Republic), “.ga” (Gabon), “.gq” (Equatorial Guinea), “.ml” (Mali), and “.tk” (Tokelau). However, Freenom <a href="https://www.netcraft.com/blog/impact-of-freenom-halting-registrations-on-cybercrime/">stopped</a> new registrations during 2023 following the lawsuit, and in February 2024, <a href="https://web.archive.org/web/20240213203456/https://www.freenom.com/en/freenom_pressstatement_02122024_v0100.pdf">announced</a> its decision to exit the domain name business.</p><p>Focusing on Freenom TLDs, which appeared in our top 50 ranking only in the first half of 2023, we see a clear shift. Since October, these TLDs have become less relevant in terms of all emails, including malicious and spam percentages. In February 2023, they accounted for 0.17% of all malicious emails we tracked, and 0.04% of all spam and malicious. Their presence has decreased since then, becoming almost non-existent in email volume in September and October, similar to <a href="https://krebsonsecurity.com/2023/05/phishing-domains-tanked-after-meta-sued-freenom/">other analyses</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MTEAWpk1xTLb2KbcFi20I/21cd4c1ef1b10d4ae2af4fb5cb0b6e56/Screenshot-2024-03-26-at-10.22.18.png" />
            
            </figure>
    <div>
      <h2>TLDs ordered by volume of spam + malicious</h2>
      <a href="#tlds-ordered-by-volume-of-spam-malicious">
        
      </a>
    </div>
    <p>In addition to looking at their share, another way to examine the data is to identify the TLDs that have a higher volume of spam and malicious emails — the next table is ordered that way. This means that we are able to show more familiar (and much older) TLDs, such as “.com”. We've included here the percentage of all emails in any given TLD that are classified as spam or malicious, and also spam + malicious to spotlight those that may require more caution. For instance, with high volume “.shop”, “.no”, “.click”, “.beauty”, “.top”, “.monster”, “.autos”, and “.today” stand out with a higher spam and malicious percentage (and also only malicious email percentage).</p><p>In the realm of country-code TLDs, Norway’s “.no” leads in spam, followed by China’s “.cn”, Russia’s “.ru”, Ukraine’s “.ua”, and Anguilla’s “<a href="https://www.cloudflare.com/application-services/products/registrar/buy-ai-domains/">.ai</a>”, which recently has been used more for artificial intelligence-related domains than for the country itself.</p><p>In <b>bold</b> and <b>red</b>, we’ve highlighted the TLDs where spam + malicious represents more than 20% of all emails in that TLD — already what we consider a high number for domains with a lot of emails.</p><p></p>
    <div>
      <h2>The curious case of “.gov” email spoofing</h2>
      <a href="#the-curious-case-of-gov-email-spoofing">
        
      </a>
    </div>
    <p>When we concentrate our research on message volume to identify TLDs with more malicious emails blocked by our Cloud Email Security service, we discover a trend related to “.gov”.</p><table><colgroup><col></col><col></col></colgroup><tbody><tr><td><p><span>TLDs ordered by malicious email volume</span></p></td><td><p><span>% of all malicious emails</span></p></td></tr><tr><td><p><span>.com</span></p></td><td><p><span>63%</span></p></td></tr><tr><td><p><span>.net</span></p></td><td><p><span>5%</span></p></td></tr><tr><td><p><span>.shop</span></p></td><td><p><span>5%</span></p></td></tr><tr><td><p><span>.org</span></p></td><td><p><span>3%</span></p></td></tr><tr><td><p><span>.gov</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>.ru</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>.jp</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>.click</span></p></td><td><p><span>1%</span></p></td></tr><tr><td><p><span>.best</span></p></td><td><p><span>0.9%</span></p></td></tr><tr><td><p><span>.beauty</span></p></td><td><p><span>0.8%</span></p></td></tr></tbody></table><p>The first three domains, ".com" (63%), ".net" (5%), and ".shop" (5%), were previously seen in our rankings and are not surprising. However, in fourth place is "<a href="https://www.cloudflare.com/application-services/products/registrar/buy-org-domains/">.org</a>", known for being used by non-profit and other similar organizations, but it has an open registration policy. In fifth place is ".gov", used only by the US government and administered by <a href="https://en.wikipedia.org/wiki/Cybersecurity_and_Infrastructure_Security_Agency">CISA</a>. Our investigation suggests that it appears in the ranking because of typical attacks where cybercriminals pretend to be a legitimate address (<a href="https://www.cloudflare.com/learning/email-security/what-is-email-spoofing/">email spoofing</a>, creation of email messages with a forged sender address). In this case, they use ".gov" when launching attacks.</p><p>The spoofing behavior linked to ".gov" is similar to that of other TLDs. It includes fake senders failing <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF validation</a> and other DNS-based authentication methods, along with various other types of attacks. An email failing SPF, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a>, and <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC</a> checks typically indicates that a malicious sender is using an unauthorized IP, domain, or both. So, there are more straightforward ways to block spoofed emails without examining their content for malicious elements.</p>
    <div>
      <h2>Ranking TLDs by proportions of malicious and spam email in 2023</h2>
      <a href="#ranking-tlds-by-proportions-of-malicious-and-spam-email-in-2023">
        
      </a>
    </div>
    <p>In this section, we have included two lists: one ranks TLDs by the highest percentage of malicious emails — those you should exercise greater caution with; the second ranks TLDs by just their spam percentage. These contrast with the previous top 50 list ordered by combined spam and malicious percentages. In the case of malicious emails, the top 3 with the highest percentage are all generic TLDs. The #1 was “.bar”, with 70% of all emails being categorized as malicious, followed by “.makeup”, and “.cyou” — marketed as the phrase "see you”.</p><p>The malicious list also includes some country-code TLDs (ccTLDs) not primarily used for country-related topics, like .ml (Mali), .om (Oman), and .pw (Palau). The list also includes other ccTLDs such as .ir (Iran) and .kg (Kyrgyzstan), .lk (Sri Lanka).</p><p>In the spam realm, it’s “autos”, with 93%, and other generic TLDs such as “.today”, and “.directory” that take the first three spots, also seeing shares over 90%.</p><p></p>
    <div>
      <h2>How it stands in 2024: new higher-risk TLDs</h2>
      <a href="#how-it-stands-in-2024-new-higher-risk-tlds">
        
      </a>
    </div>
    <p>2024 has seen new players enter the high-risk zone for unwanted emails. In this list we have only included the new TLDs that weren’t in the top 50 during 2023, and joined the list in January. New entrants include Samoa's “.ws”, Indonesia's “.id” (also used because of its “identification” meaning), and the Cocos Islands' “.cc”. These ccTLDs, often used for more than just country-related purposes, have shown high percentages of malicious emails, ranging from 20% (.cc) to 95% (.ws) of all emails.</p><table><colgroup><col></col><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>January 2024: Newer TLDs in the top 50 list</span></p></td></tr><tr><td><p><span>TLD</span></p></td><td><p><span>Spam %</span></p></td><td><p><span>Malicious %</span></p></td><td><p><span>Spam + mal %</span></p></td></tr><tr><td><p><span>.ws</span></p></td><td><p><span>3%</span></p></td><td><p><span>95%</span></p></td><td><p><span>98%</span></p></td></tr><tr><td><p><span>.company</span></p></td><td><p><span>96%</span></p></td><td><p><span>0%</span></p></td><td><p><span>96%</span></p></td></tr><tr><td><p><span>.digital</span></p></td><td><p><span>72%</span></p></td><td><p><span>2%</span></p></td><td><p><span>74%</span></p></td></tr><tr><td><p><span>.pro</span></p></td><td><p><span>66%</span></p></td><td><p><span>6%</span></p></td><td><p><span>73%</span></p></td></tr><tr><td><p><span>.tz</span></p></td><td><p><span>62%</span></p></td><td><p><span>4%</span></p></td><td><p><span>65%</span></p></td></tr><tr><td><p><span>.id</span></p></td><td><p><span>13%</span></p></td><td><p><span>39%</span></p></td><td><p><span>51%</span></p></td></tr><tr><td><p><span>.cc</span></p></td><td><p><span>25%</span></p></td><td><p><span>21%</span></p></td><td><p><span>46%</span></p></td></tr><tr><td><p><span>.space</span></p></td><td><p><span>32%</span></p></td><td><p><span>8%</span></p></td><td><p><span>40%</span></p></td></tr><tr><td><p><span>.enterprises</span></p></td><td><p><span>2%</span></p></td><td><p><span>37%</span></p></td><td><p><span>40%</span></p></td></tr><tr><td><p><span>.lv</span></p></td><td><p><span>30%</span></p></td><td><p><span>1%</span></p></td><td><p><span>30%</span></p></td></tr><tr><td><p><span>.cn</span></p></td><td><p><span>26%</span></p></td><td><p><span>3%</span></p></td><td><p><span>29%</span></p></td></tr><tr><td><p><span>.jo</span></p></td><td><p><span>27%</span></p></td><td><p><span>1%</span></p></td><td><p><span>28%</span></p></td></tr><tr><td><p><span>.info</span></p></td><td><p><span>21%</span></p></td><td><p><span>5%</span></p></td><td><p><span>26%</span></p></td></tr><tr><td><p><span>.su</span></p></td><td><p><span>20%</span></p></td><td><p><span>5%</span></p></td><td><p><span>25%</span></p></td></tr><tr><td><p><span>.ua</span></p></td><td><p><span>23%</span></p></td><td><p><span>1%</span></p></td><td><p><span>24%</span></p></td></tr><tr><td><p><span>.museum</span></p></td><td><p><span>0%</span></p></td><td><p><span>24%</span></p></td><td><p><span>24%</span></p></td></tr><tr><td><p><span>.biz</span></p></td><td><p><span>16%</span></p></td><td><p><span>7%</span></p></td><td><p><span>24%</span></p></td></tr><tr><td><p><span>.se</span></p></td><td><p><span>23%</span></p></td><td><p><span>0%</span></p></td><td><p><span>23%</span></p></td></tr><tr><td><p><span>.ai</span></p></td><td><p><span>21%</span></p></td><td><p><span>0%</span></p></td><td><p><span>21%</span></p></td></tr></tbody></table>
    <div>
      <h2>Overview of email threat trends since 2023</h2>
      <a href="#overview-of-email-threat-trends-since-2023">
        
      </a>
    </div>
    <p>With Cloudflare's Cloud Email Security, we gain insight into the broader email landscape over the past months. The <b>spam</b> percentage of all emails stood at <b>8.58%</b> in 2023. As mentioned before, keep in mind with these percentages that our protection typically kicks in after other email providers’ filters have already removed some spam and malicious emails.</p><p>How about malicious emails? Almost <b>3%</b> of all emails were flagged as <b>malicious</b> during 2023, with the highest percentages occurring in Q4. Here’s the “malicious” evolution, where we’re also including the January and February 2024 perspective:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4B6rev8c7oe4xZyNsMTcAK/93446b6b094f59606df5b0ab6b6de154/maliciousbymonth.png" />
            
            </figure><p>The week before Christmas and the first week of 2024 experienced a significant spike in malicious emails, reaching an average of 7% and 8% across the weeks, respectively. Not surprisingly, there was a noticeable decrease during Christmas week, when it dropped to 3%. Other significant increases in the percentage of malicious emails were observed the week before Valentine's Day, the first week of September (coinciding with returns to work and school in the Northern Hemisphere), and late October.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RhyfKbvE1oa2Qu906JIHw/fce0efe7a85203ce6d3480b100bdaddb/weeklymalicious.png" />
            
            </figure>
    <div>
      <h2>Threat categories in 2023</h2>
      <a href="#threat-categories-in-2023">
        
      </a>
    </div>
    <p>We can also look to different types of threats in 2023. Links were present in 49% of all threats. Other categories included extortion (36%), identity deception (27%), credential harvesting (23%), and brand impersonation (18%). These categories are defined and explored in detail in Cloudflare's <a href="/2023-phishing-report/">2023 phishing threats report</a>. Extortion saw the most growth in Q4, especially in November and December reaching 38% from 7% of all threats in Q1 2023.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6icrLcHPdHqa4ooH79l7Wx/500f69ca538ce0f6fdcbb651e2655315/malthreat.png" />
            
            </figure>
    <div>
      <h2>Other trends: Attachments are still popular</h2>
      <a href="#other-trends-attachments-are-still-popular">
        
      </a>
    </div>
    <p>Other less “threatening” trends show that 20% of all emails included attachments (as the next chart shows), while 82% contained links in the body. Additionally, 31% were composed in plain text, and 18% featured HTML, which allows for enhanced formatting and visuals. 39% of all emails used remote content.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12eXy3zGva3fMxQo0GKqKw/3b06faebc6cec5b6e5dd95ff38cd67c7/emailcharact.png" />
            
            </figure>
    <div>
      <h2>Conclusion: Be cautious, prepared, safe</h2>
      <a href="#conclusion-be-cautious-prepared-safe">
        
      </a>
    </div>
    <p>The landscape of spam and malicious (or phishing) emails constantly evolves alongside technology, the Internet, user behaviors, use cases, and cybercriminals. As we’ve seen through <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare’s Cloud Email Security insights</a>, new generic TLDs have emerged as preferred channels for these malicious activities, highlighting the need for vigilance when dealing with emails from unfamiliar domains.</p><p>There's no shortage of advice on <a href="/stay-safe-phishing-attacks">staying safe from phishing</a>. Email remains a ubiquitous yet highly exploited tool in daily business operations. Cybercriminals often bait users into clicking malicious links within emails, a tactic used by both sophisticated criminal organizations and novice attackers. So, always exercise caution online.</p><p>Cloudflare's Cloud Email Security provides insights that underscore the importance of robust cybersecurity infrastructure in fighting the dynamic tactics of phishing attacks.</p><p>If you want to learn more about email security, you can check <a href="https://radar.cloudflare.com/email-security">Cloudflare Radar’s new email section</a>, visit our <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">Learning Center</a> or reach out for a complimentary phishing <a href="https://www.cloudflare.com/lp/emailsecurity/">risk assessment</a> for your organization.</p><p><i>(Contributors to this blog post include Jeremy Eckman, Phil Syme, and Oren Falkowitz.)</i></p> ]]></content:encoded>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">3Hx7frhlsXSPEICR3DLVtJ</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Defensive AI: Cloudflare’s framework for defending against next-gen threats]]></title>
            <link>https://blog.cloudflare.com/defensive-ai/</link>
            <pubDate>Mon, 04 Mar 2024 14:00:24 GMT</pubDate>
            <description><![CDATA[ From identifying phishing attempts to protect applications and APIs, Cloudflare uses AI to improve the effectiveness of its security solutions to fight against new and more sophisticated attacks ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xVD4cmhSUcJddNAFw2AJc/6fb1537ad293d5d4eee9059aae0eec9b/Personalized-defensive-AI.png" />
            
            </figure><p>Generative AI has captured the imagination of the world by being able to produce poetry, screenplays, or imagery. These tools can be used to improve human productivity for good causes, but they can also be employed by malicious actors to carry out sophisticated attacks.</p><p>We are witnessing phishing attacks and social engineering becoming more sophisticated as attackers tap into powerful new tools to generate credible content or interact with humans as if it was a real person. Attackers can use AI to build boutique tooling made for attacking specific sites with the intent of harvesting proprietary data and taking over user accounts.</p><p>To protect against these new challenges, we need new and more sophisticated security tools: this is how Defensive AI was born. Defensive AI is the framework Cloudflare uses when thinking about how intelligent systems can improve the effectiveness of our security solutions. The key to Defensive AI is data generated by Cloudflare’s vast network, whether generally across our entire network or specific to individual customer traffic.</p><p>At Cloudflare, we use AI to increase the level of protection across all security areas, ranging from <a href="https://www.cloudflare.com/application-services/solutions/">application security</a> to email security and our <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>. This includes creating customized protection for every customer for API or email security, or using our huge amount of attack data to train models to detect application attacks that haven’t been discovered yet.</p><p>In the following sections, we will provide examples of how we designed the latest generation of security products that leverage AI to secure against AI-powered attacks.</p>
    <div>
      <h3>Protecting APIs with anomaly detection</h3>
      <a href="#protecting-apis-with-anomaly-detection">
        
      </a>
    </div>
    <p>APIs power the modern Web, comprising <a href="/2024-api-security-report/">57% of dynamic traffic</a> across the Cloudflare network, up from 52% in 2021. While APIs aren’t a new technology, securing them differs from securing a traditional web application. Because APIs offer easy programmatic access by design and are growing in popularity, fraudsters and threat actors have pivoted to targeting APIs. Security teams must now counter this rising threat. Importantly, each API is usually unique in its purpose and usage, and therefore <a href="https://www.cloudflare.com/application-services/solutions/api-security/">securing APIs</a> can take an inordinate amount of time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ojHc36uSFsnCBr870kK38/f4b7df6df5c60ffb087255ffb442e5e3/Screenshot-2024-03-01-at-1.39.29-PM.png" />
            
            </figure><p>Cloudflare is announcing the development of API Anomaly Detection for <a href="/api-gateway/">API Gateway</a> to protect APIs from attacks designed to damage applications, take over accounts, or <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate data</a>. API Gateway provides a layer of protection between your hosted APIs and every device that interfaces with them, giving you the visibility, control, and security tools you need to manage your APIs.</p><p>API Anomaly Detection is an upcoming, ML-powered feature in our API Gateway product suite and a natural successor to <a href="/api-sequence-analytics">Sequence Analytics</a>. In order to protect APIs at scale, API Anomaly Detection learns an application’s business logic by analyzing client API request sequences. It then builds a model of what a sequence of expected requests looks like for that application. The resulting traffic model is used to identify attacks that deviate from the expected client behavior. As a result, API Gateway can use its <a href="https://developers.cloudflare.com/api-shield/security/sequence-mitigation/">Sequence Mitigation</a> functionality to enforce the learned model of the application’s intended business logic, stopping attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/edeVw346MG6dZbjaDt97L/263e9c18c51f5320ce6e0c1d9ab957df/Screenshot-2024-03-01-at-2.01.25-PM-1.png" />
            
            </figure><p>While we’re still developing API Anomaly Detection, API Gateway customers can sign up <a href="https://www.cloudflare.com/lp/api-anomaly-detection/">here</a> to be included in the beta for API Anomaly Detection. Today, customers can get started with Sequence Analytics and Sequence Mitigation by reviewing the <a href="https://developers.cloudflare.com/api-shield/security/">docs</a>. Enterprise customers that haven’t purchased API Gateway can <a href="http://dash.cloudflare.com/?to=/:account/:zone/security/api-shield">self-start a trial</a> in the Cloudflare Dashboard, or contact their account manager for more information.</p>
    <div>
      <h3>Identifying unknown application vulnerabilities</h3>
      <a href="#identifying-unknown-application-vulnerabilities">
        
      </a>
    </div>
    <p>Another area where AI improves security is in our <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall (WAF)</a>. Cloudflare processes 55 million HTTP requests per second on average and has an unparalleled visibility into attacks and exploits across the world targeting a wide range of applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3oTIWUwe5Em3tD4ACksp6b/0036dcdf5af715f4095ffb14ae9b3769/Screenshot-2024-03-01-at-1.41.23-PM.png" />
            
            </figure><p>One of the big challenges with the WAF is adding protections for new vulnerabilities and false positives. A WAF is a collection of rules designed to identify attacks directed at web applications. New vulnerabilities are discovered daily and at Cloudflare we have a team of security analysts that create new rules when vulnerabilities are discovered. However, manually creating rules takes time — usually hours — leaving applications potentially vulnerable until a protection is in place. The other problem is that attackers continuously evolve and mutate existing attack payloads that can potentially bypass existing rules.</p><p>This is why Cloudflare has, for years, leveraged machine learning models that constantly learn from the latest attacks, deploying mitigations without the need for manual rule creation. This can be seen, for example, in our <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">WAF Attack Score</a> solution. WAF Attack Score is based on an ML model trained on attack traffic identified on the Cloudflare network. The resulting classifier allows us to identify variations and bypasses of existing attacks as well as extending the protection to <a href="/how-cloudflares-ai-waf-proactively-detected-ivanti-connect-secure-critical-zero-day-vulnerability">new and undiscovered attacks</a>. Recently, we have made Attack Score <a href="/waf-attack-score-for-business-plan">available to all Enterprise and Business plans</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25Jw91tB0o7lKhsgzvbqPV/748a7365c126ba03e2382b3eff988c37/Screenshot-2024-03-01-at-18.16.22.png" />
            
            </figure><p><i>Attack Score uses AI to classify each HTTP request based on the likelihood that it’s malicious</i></p><p>While the contribution of security analysts is indispensable, in the era of AI and rapidly evolving attack payloads, a <a href="https://www.cloudflare.com/cybersecurity-risk-management/">robust security posture</a> demands solutions that do not rely on human operators to write rules for each novel threat. Combining Attack Score with traditional signature-based rules is an example of how intelligent systems can support tasks carried out by humans. Attack Score identifies new malicious payloads which can be used by analysts to optimize rules that, in turn, provide better training data for our AI models. This creates a reinforcing positive feedback loop improving the overall protection and response time of our WAF.</p><p>Long term, we will adapt the AI model to account for customer-specific traffic characteristics to better identify deviations from normal and benign traffic.</p>
    <div>
      <h3>Using AI to fight phishing</h3>
      <a href="#using-ai-to-fight-phishing">
        
      </a>
    </div>
    <p>Email is one of the most effective vectors leveraged by bad actors with the US Cybersecurity and Infrastructure Security Agency (<a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>) reporting that 90% of cyber attacks start with phishing and Cloudflare Email Security <a href="https://radar.cloudflare.com/year-in-review/2023#malicious-emails">marking 2.6% of 2023's emails as malicious</a>. The rise of AI-enhanced attacks are making traditional email security providers obsolete, as threat actors can now craft phishing emails that are more credible than ever with little to no language errors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27B73JPLutOrg6shC9gZnh/3e49607d69ce330333204c3d061d9fa5/Screenshot-2024-03-01-at-1.41.30-PM.png" />
            
            </figure><p>Cloudflare <a href="https://developers.cloudflare.com/email-security/">Email Security</a> is a cloud-native service that stops phishing attacks across all threat vectors. Cloudflare’s email security product continues to protect customers with its AI models, even as trends like Generative AI continue to evolve. Cloudflare’s models analyze all parts of a phishing attack to determine the risk posed to the end user. Some of our AI models are personalized for each customer while others are trained holistically. Privacy is paramount at Cloudflare, so only non-personally identifiable information is used by our tools for training. In 2023, <a href="/2023-phishing-report">Cloudflare processed approximately 13 billion</a>, and blocked 3.4 billion, emails, providing the email security product a rich dataset that can be used to train AI models.</p><p>Two detections that are part of our portfolio are Honeycomb and Labyrinth.</p><ul><li><p><i>Honeycomb</i> is a patented email sender domain reputation model. This service builds a graph of who is sending messages and builds a model to determine risk. Models are trained on specific customer traffic patterns, so every customer has AI models trained on what their good traffic looks like.</p></li><li><p><i>Labyrinth</i> uses ML to protect on a per-customer basis. Actors attempt to spoof emails from our clients’ valid partner companies.  We can gather a list with statistics of known &amp; good email senders for each of our clients. We can then detect the spoof attempts when the email is sent by someone from an unverified domain, but the domain mentioned in the email itself is a reference/verified domain.</p></li></ul><p>AI remains at the core of our email security product, and we are constantly improving the ways we leverage it within our product. If you want to get more information about how we are using our AI models to stop AI enhanced phishing attacks check out our blog post here.</p>
    <div>
      <h3>Zero-Trust security protected and powered by AI</h3>
      <a href="#zero-trust-security-protected-and-powered-by-ai">
        
      </a>
    </div>
    <p>Cloudflare <a href="https://www.cloudflare.com/en-gb/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> provides administrators the tools to protect access to their IT infrastructure by enforcing strict identity verification for every person and device regardless of whether they are sitting within or outside the network perimeter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qpOOjCeP6yqWtYrSgJdCu/4693906c9faf833a57db45672472f23d/Cloudflare-One-User-Risk-Scores_b.png" />
            
            </figure><p>One of the big challenges is to enforce strict access control while reducing the friction introduced by frequent verifications. Existing solutions also put pressure on IT teams that need to analyze log data to track how risk is evolving within their infrastructure. Sifting through a huge amount of data to find rare attacks requires large teams and substantial budgets.</p><p>Cloudflare simplifies this process by introducing behavior-based user risk scoring. Leveraging AI, we analyze real-time data to identify anomalies in the users’ behavior and signals that could lead to harms to the organization. This provides administrators with recommendations on how to tailor the security posture based on user behavior.</p><p>Zero Trust user risk scoring detects user activity and behaviors that could introduce risk to your organizations, systems, and data and assigns a score of Low, Medium, or High to the user involved. This approach is sometimes referred to as <a href="https://www.cloudflare.com/learning/security/what-is-ueba/">user and entity behavior analytics (UEBA)</a> and enables teams to detect and remediate possible account compromise, company policy violations, and other risky activity.</p><p>The first contextual behavior we are launching is “impossible travel”, which helps identify if a user’s credentials are being used in two locations that the user could not have traveled to in that period of time. These risk scores can be further extended in the future to highlight personalized behavior risks based on contextual information such as time of day usage patterns and access patterns to flag any anomalous behavior. Since all traffic would be proxying through your SWG, this can also be extended to resources which are being accessed, like an internal company repo.</p><p>We have an exciting launch during security week. <a href="/cf1-user-risk-score/">Check out this blog to learn more</a>.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>From application and email security to <a href="https://www.cloudflare.com/network-security/">network security</a> and Zero Trust, we are witnessing attackers leveraging new technologies to be more effective in achieving their goals. In the last few years, multiple Cloudflare product and engineering teams have adopted intelligent systems to better identify abuses and <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">increase protection</a>.</p><p>Besides the generative AI craze, AI is already a crucial part of how we defend digital assets against attacks and how we discourage bad actors.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[AI]]></category>
            <category><![CDATA[Machine Learning]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">76ClOKhWKWuLLPML351f39</guid>
            <dc:creator>Daniele Molteni</dc:creator>
            <dc:creator>John Cosgrove</dc:creator>
            <dc:creator>Ayush Kumar</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare's 2023 phishing threats report]]></title>
            <link>https://blog.cloudflare.com/2023-phishing-report/</link>
            <pubDate>Wed, 16 Aug 2023 09:13:17 GMT</pubDate>
            <description><![CDATA[ The 2023 Phishing Threats Report analyzes millions of malicious emails, brand impersonation examples, identity deception and other key attack trends based on email security data from a 12-month period ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zKdGorR5BXoIDN9iE1c2y/ef2bc7e7b92d5b73dd48caba515210bb/Introducing-Cloudflare-2023-phishing-threats-report-1.png" />
            
            </figure><p>After shutting down a ‘phishing-as-a-service’ operation that impacted thousands of victims in 43 countries, INTERPOL recently <a href="https://www.interpol.int/en/News-and-Events/News/2023/Notorious-phishing-platform-shut-down-arrests-in-international-police-operation?">noted</a>, “Cyberattacks such as phishing may be borderless and virtual in nature, but their impact on victims is real and devastating.” Business email compromise (<a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">BEC</a>), a type of malware-less attack that tricks recipients into transferring funds — for example — has <a href="https://www.ic3.gov/Media/Y2023/PSA230609">cost</a> victims worldwide more than $50 billion, according to the FBI.</p><p>It is estimated that 90% of successful cyber attacks <a href="https://www.cisa.gov/shields-guidance-families">start</a> with email <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing</a>, which continues to be very lucrative for attackers. There is not much today that can be done to stop phishing <i>attempts</i>. However, to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevent <i>successful</i> attacks</a>, it is important to understand (and proactively address) evolving phishing trends — including the ways attackers cleverly exploit intended victims’ trust in “known” email senders. To that end, this week Cloudflare published its first <a href="https://www.cloudflare.com/lp/2023-phishing-report/">Phishing Threats Report</a>.</p><p>This report explores key phishing trends and related recommendations, based on <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> data from May 2022 to May 2023. During that time, Cloudflare <b>processed approximately 13 billion emails</b>, which included blocking approximately <b>250 million malicious messages</b> from reaching customers’ inboxes. The report is also informed by a Cloudflare-commissioned <b>survey of 316 security decision-makers</b> across North America, EMEA, and APAC (you can download that separate study <a href="https://www.cloudflare.com/lp/zero-trust-to-combat-multichannel-phishing/">here</a>).</p><p>Check out the full report to understand our three key takeaways:</p><ul><li><p><b>Attackers using deceptive links as the #1 phishing tactic</b> — and how they are evolving how they get you to click and when they weaponize the link;</p></li><li><p><b>Identity deception</b> takes multiple forms (including business email compromise (BEC) and brand impersonation), <b>and can easily bypass email authentication standards;</b></p></li><li><p>Attackers pretend to be hundreds of different organizations, but they <b>primarily impersonate the entities we trust</b> and need to get work done.</p></li></ul><p>Here are a few other things to keep in mind as you read the 2023 Phishing Threats report.</p>
    <div>
      <h3>Email threat categorization</h3>
      <a href="#email-threat-categorization">
        
      </a>
    </div>
    <p>Attackers typically use a combination of <a href="https://www.cloudflare.com/learning/security/threats/social-engineering-attack/">social engineering</a> and technical obfuscation techniques to make their messages seem legitimate. Therefore, Cloudflare uses a number of advanced detection techniques to analyze “fuzzy” signals (not just content that’s visible to the naked eye) to identify unwanted emails. Those signals include:</p><ul><li><p><b>Structural analysis</b> of headers, body copy, images, links, attachments, payloads, and more, using heuristics and <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning models</a> specifically designed for phishing signals;</p></li><li><p><b>Sentiment analysis</b> to detect changes in patterns and behaviors (e.g., writing patterns and expressions);</p></li><li><p><b>Trust graphs</b> that evaluate partner social graphs, email sending history, and potential partner impersonations</p></li></ul><p>Our <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> also incorporates <a href="https://www.cloudflare.com/learning/security/glossary/threat-intelligence-feed/">threat intelligence</a> from Cloudflare’s global network, which blocks an average of 140 billion cyber threats each day.</p><p>Those and many other signals lead to email dispositions of malicious, BEC, spoof, or spam; our dashboard tells customers the specific reasons (i.e., the threat indicator ‘categories’) for a particular email disposition.</p><p>Below is a snapshot of the top email threat indicators we observed between May 2, 2022, to May 2, 2023. We categorize threat indicators into more than 30 different categories; over that period, the top threat indicators included <b>deceptive links</b>, <b>domain age</b> (newly registered domains), <b>identity deception</b>, <b>credential harvesting</b>, and <b>brand impersonation</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JfZOoAKRayGTRMdjkwQOn/502f97161f6cdd8ba4614e299e5f6fc9/image4-6.png" />
            
            </figure><p>Below are brief descriptions of each of the top categories (detailed in more depth in the report’s appendix).</p><p>If clicked, a <b>deceptive link</b> will open the user’s default web browser and render the data referenced in the link, or open an application directly (e.g. a PDF). Since the display text for a link (i.e., hypertext) in HTML can be arbitrarily set, attackers can make a URL appear as if it links to a benign site when, in fact, it is actually malicious.</p><p><b>Domain age</b> is related to domain reputation, which is the overall score assigned to a domain.  For example, domains that send out numerous new emails immediately after domain registration will tend to have a poorer reputation, and thus a lower score.</p><p><b>Identity deception</b> occurs when an attacker or someone with malicious intent sends an email claiming to be someone else. The mechanisms and tactics of this vary widely. Some tactics include registering domains that look similar (aka domain impersonation), are spoofed, or use display name tricks to appear to be sourced from a trusted domain. Other variations include sending email using domain fronting and high-reputation web services platforms.</p><p><b>Credential harvesters</b> are set up by an attacker to deceive users into providing their login credentials. Unwitting users may enter their credentials, ultimately providing attackers with access to their accounts.</p><p><b>Brand impersonation</b> is a form of identity deception where an attacker sends a phishing message that impersonates a recognizable company or brand. Brand impersonation is conducted using a wide range of techniques.</p><p>An <b>attachment</b> to an email that, when opened or executed in the context of an attack, includes a call-to-action (e.g. lures target to click a link) or performs a series of actions set by an attacker.</p><p>Cloudflare regularly observes multiple threat indicators in one phishing email. For example, one Silicon Valley Bank-themed phishing campaign (detailed in <a href="/how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank/">this</a> March 2023 blog) combined <i>brand impersonation</i> with a <i>deceptive link</i> and <i>malicious attachment</i>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uyngezMfEcC6gf784nyV6/225bc53f509017a05329698ccea01c74/image3-5.png" />
            
            </figure><p>The attackers leveraged the SVB brand in a DocuSign-themed template. The email included HTML code that contains an initial link and a complex redirect chain that is four deep. The included HTML file in the attack would have sent the recipient to a WordPress instance that has recursive redirection capability.</p><p>(Speaking of links, deceptive links were the <b>#1 threat category,</b> appearing in <b>35.6% of our detections</b>. And attackers aren’t just using links in email channels; the rise of multi-channel phishing threats — which exploit other applications such as SMS/text, chat, and social media — are also covered in the report).</p>
    <div>
      <h3>Trusted (and most impersonated) brands</h3>
      <a href="#trusted-and-most-impersonated-brands">
        
      </a>
    </div>
    <p>Silicon Valley Bank was just one of <b>approximately 1,000 different brands</b> we observed being impersonated in emails targeting Cloudflare customers between May 2022 and May 2023. (Cloudflare employees were directly targeted via brand impersonation in the “Oktapus” phishing attack that the <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> suite of products <a href="/2022-07-sms-phishing-attacks/">thwarted</a> in July 2022).</p><p>However, as detailed in the Phishing Threats Report, we observed that email attackers most often (51.7% of the time) impersonated one of 20 well-known global brands, with <b>Microsoft</b> being #1 on their list.</p>
<table>
<thead>
  <tr>
    <th><span>Rank</span></th>
    <th><span>Impersonated brand</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>1</span></td>
    <td><span>Microsoft</span></td>
  </tr>
  <tr>
    <td><span>2</span></td>
    <td><span>World Health Organization</span></td>
  </tr>
  <tr>
    <td><span>3</span></td>
    <td><span>Google</span></td>
  </tr>
  <tr>
    <td><span>4</span></td>
    <td><span>SpaceX</span></td>
  </tr>
  <tr>
    <td><span>5</span></td>
    <td><span>Salesforce</span></td>
  </tr>
  <tr>
    <td><span>6</span></td>
    <td><span>Apple</span></td>
  </tr>
  <tr>
    <td><span>7</span></td>
    <td><span>Amazon</span></td>
  </tr>
  <tr>
    <td><span>8</span></td>
    <td><span>T-Mobile</span></td>
  </tr>
  <tr>
    <td><span>9</span></td>
    <td><span>YouTube</span></td>
  </tr>
  <tr>
    <td><span>10</span></td>
    <td><span>MasterCard</span></td>
  </tr>
  <tr>
    <td><span>11</span></td>
    <td><span>Notion.so</span></td>
  </tr>
  <tr>
    <td><span>12</span></td>
    <td><span>Comcast</span></td>
  </tr>
  <tr>
    <td><span>13</span></td>
    <td><span>Line Pay</span></td>
  </tr>
  <tr>
    <td><span>14</span></td>
    <td><span>MasterClass</span></td>
  </tr>
  <tr>
    <td><span>15</span></td>
    <td><span>Box</span></td>
  </tr>
  <tr>
    <td><span>16</span></td>
    <td><span>Truist Financial Corp</span></td>
  </tr>
  <tr>
    <td><span>17</span></td>
    <td><span>Facebook</span></td>
  </tr>
  <tr>
    <td><span>18</span></td>
    <td><span>Instagram</span></td>
  </tr>
  <tr>
    <td><span>19</span></td>
    <td><span>AT&amp;T</span></td>
  </tr>
  <tr>
    <td><span>20</span></td>
    <td><span>Louis Vuitton</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Example of a Microsoft credential harvesting attempt</h3>
      <a href="#example-of-a-microsoft-credential-harvesting-attempt">
        
      </a>
    </div>
    <p>Earlier this year, Cloudflare detected and blocked a phishing campaign leveraging the Microsoft brand in an attempt to harvest credentials through a legitimate — but compromised — site.</p><p>In the email example below, there is no text in the body of the email despite its appearance. The entire body is a hyperlinked JPEG image. Thus, if the recipient clicks anywhere in the body (even if they don’t intend to click the link), they are effectively clicking the link.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7awKbnZvPkxboytqFmUaGl/7506202a224e5b3ee8736074d7d7e7d0/image1-16.png" />
            
            </figure><p>Initially, the hyperlink for this image appears to be a benign Baidu URL - hxxp://www.baidu[.]com/link?url=-yee3T9X9U41UHUa3VV6lx1j5eX2EoI6XpZqfDgDcf-2NYQ8RVpOn5OYkDTuk8Wg#&lt;recipient’s email address base64 encoded&gt;.  However, if this link is clicked, the target’s browser would be redirected to a site that had been compromised and used to host a credential harvester.</p><p>The attacker used Microsoft Office 365 branding, but attempted to circumvent any brand detection techniques by including the brand information within the image (i.e., there was no plaintext or HTML text that could be inspected to identify the brand).</p><p>However, using optical character recognition (OCR), Cloudflare successfully identified “Office 365” and “Microsoft” in the image. Using OCR, we also identified the use of suspicious account lures related to passwords.</p><p>In this example, attackers’ techniques included:</p><ul><li><p>Inclusion of only a JPEG image (impossible to detect words without OCR)</p></li><li><p>Embedding a hyperlink in that image (clicking anywhere in the body would result in clicking the link)</p></li><li><p>Hyperlinking to a Baidu URL (used to bypass reputation-based URL detection techniques)</p></li><li><p>The Baidu URL redirecting the recipient’s browser to a credential harvesting site (i.e., would circumvent other email security defenses that are not capable of deep link inspection)</p></li><li><p>Hosting the credential harvester on a legitimate site that had been compromised by the attacker (even with deep link inspection, will again attempt to bypass URL detection techniques based on reputation)</p></li></ul><p>This attack vector leverages the high reputation and authenticity of Baidu to bypass the reputation of the true host/IP where the credential harvester is hosted.</p><p>While this specific campaign focused on harvesting Microsoft credentials, we often see attackers using similar methods to bypass brand detection techniques and trick victims into downloading <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> and other <a href="https://www.cloudflare.com/learning/security/glossary/malicious-payload/">malicious payloads</a>.</p><p>URL redirection techniques are often seen in phishing campaigns, but threat actors are continuing to refine their approach by abusing more and more legitimate domains like <a href="http://baidu.com">baidu.com</a>, <a href="http://bing.com">bing.com</a>, <a href="http://goo.gl">goo.gl</a>, etc. Our numerous detection capabilities allow us to conduct deep link inspection of URLs using redirection techniques of all kinds, including those that abuse legitimate domains.</p>
    <div>
      <h3>What about SPF, DKIM, and DMARC?</h3>
      <a href="#what-about-spf-dkim-and-dmarc">
        
      </a>
    </div>
    <p>Email authentication (specifically the <a href="https://www.cloudflare.com/learning/email-security/dmarc-dkim-spf/">SPF, DKIM, and DMARC</a> standards) are often mentioned as useful against brand impersonation: these standards help validate server and tenant origins, protect message integrity, provide policy enforcement, and more.</p><p>However, attackers can still find ways to bypass authentication to trick email suites; and we actually observed that <b>89% of unwanted messages “passed”</b> SPF, DKIM, and/or DMARC checks.</p><p>Some limitations of email authentication include:</p>
<table>
<thead>
  <tr>
    <th><span>SPF  </span><br /><span>(Sender Policy Framework)</span></th>
    <th><span>Key benefits:</span><br /><span>Validating server origin (i.e., validates where a message originates from)</span><br /><span>Defining which email servers and services are allowed to send messages on a domain owner’s behalf</span></th>
  </tr>
  <tr>
    <th><span>Limitations:</span><br /><span>Does not prevent lookalike email, domain, or display name </span><a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/"><span>spoofing</span></a><br /><span>Does not validate the “From” header; uses envelope “From” to determine sending domain</span><br /><span>Validation ineffective when emails are forwarded or when messages sent to a mailing list are sent to each subscriber </span><br /><span>SPF evaluation process can be limited to a certain number of </span><a href="https://www.cloudflare.com/learning/dns/what-is-dns/"><span>DNS</span></a><span> lookups</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, </span><a href="https://www.cloudflare.com/learning/security/glossary/malicious-payload/"><span>malicious payloads</span></a><span>, or attachments</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>DKIM </span><br /><span>(Domain Keys Identified Mail)</span></td>
    <td><span>Key benefits:</span><br /><span>Providing tenant origin validation (i.e., checks that an email was sent/authorized by the owner of the domain via a digital signature)</span><br /><span>Ensuring email is not altered while transferred from server to server; protecting message integrity</span></td>
  </tr>
  <tr>
    <td><span>Limitations:</span><br /><span>Does not prevent lookalike email, domain, or display name spoofing</span><br /><span>Does not protect against </span><a href="https://developers.cloudflare.com/magic-wan/reference/anti-replay-protection/"><span>replay attacks</span></a><span> (DKIM only signs specific parts of a message. Attackers can add other header fields to emails passing DKIM then forward them.)</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</span></td>
  </tr>
  <tr>
    <td><span>DMARC (Domain-based Message Authentication, Reporting and Conformance)</span></td>
    <td><span>Key benefits:</span><br /><span>Providing policy enforcement and reporting for SPF and DKIM</span><br /><span>Stipulating what policy to follow if an email doesn’t pass SPF or DKIM authentication (e.g. reject/delete, quarantine, no policy/send)</span><br /><span>Reporting function allows domain owners to see who is sending email on their behalf (i.e., protecting against spoofing of your own domain and brand abuse)</span></td>
  </tr>
  <tr>
    <td><span>Limitations: </span><br /><span>Does not prevent spoofing of another brand’s domain</span><br /><span>Does not prevent lookalike email, domain, or display name spoofing</span><br /><span>Domain owners specify what percentage of mail DMARC policies it applies to; application percentages of less than 100% are less effective</span><br /><span>Does not protect against attacks using “validated” emails with embedded URLs, malicious payloads or attachments</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Conclusions</h3>
      <a href="#conclusions">
        
      </a>
    </div>
    <p>Attackers are constantly evolving their tactics. Multiple protection layers must be enacted before, during, and after messages reach the inbox. Cloudflare never inherently “trusts” any type of email communication (whether it appears to be internal, external, or from a ‘known’ business partner).</p><p>Likewise, we recommend that — first and foremost — all organizations extend the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security model</a> of “never trust, always verify” not just to the network and applications, but also to the email inbox.</p><p>In addition to <a href="https://www.cloudflare.com/zero-trust/products/email-security/">securing email</a> with a Zero Trust approach, we also recommend:</p><ul><li><p><b>Augmenting cloud email with multiple anti-phishing controls.</b> As noted in <a href="https://www.forrester.com/blogs/announcing-the-forrester-wave-enterprise-email-security-q2-2023/">this</a> Forrester blog from June, <i>“The use of messaging, collaboration, file sharing, and enterprise software-as-a-service applications across multiple devices all contribute to employee productivity and experience. Many of these environments are considered ‘closed,’ but one successful phish of a supply chain partner’s credentials opens your organization up to data loss, credential theft, fraud, and ransomware attacks. Protections developed for the email inbox must extend to these environments and throughout the day-to-day workflows of your employees.”</i></p></li><li><p><b>Adopting phishing-resistant multifactor authentication (</b><a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><b>MFA</b></a><b>).</b> While not all MFA provides the same layer of security, hardware security keys are among the most secure authentication methods for <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">preventing successful phishing attacks</a>. They can protect networks even if attackers gain access to usernames and passwords.</p></li><li><p><b>Make it harder for humans to make mistakes.</b>  Meet employees and teams where they are by making the tools they already use more secure, and preventing them from making mistakes. For example, remote browser isolation (<a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">RBI</a>) technology, when integrated with <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">cloud email security</a>, can automatically isolate suspicious email links to prevent users from being exposed to potentially malicious web content. Keyboard inputs can also be disabled on untrusted websites, protecting users from accidentally entering sensitive information within a form fill or credential harvesting. This provides a layer of defense against multi-channel phishing attacks by effectively allowing users to safely open links without disrupting their workflow.</p></li></ul><p>If you’re interested in the full findings, you can download the 2023 Phishing Threats Report <a href="https://www.cloudflare.com/lp/2023-phishing-report/">here</a>, as well as our recommendations for preventing successful phishing attacks. And if you’d like to see Cloudflare’s email security in action, you can request a free phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">5r8tVebXSz3ESgfdLHjC7X</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
            <dc:creator>Juliette Cash</dc:creator>
        </item>
        <item>
            <title><![CDATA[Project Cybersafe Schools: Bringing security tools for free to small K-12 school districts in the US]]></title>
            <link>https://blog.cloudflare.com/project-cybersafe-schools/</link>
            <pubDate>Tue, 08 Aug 2023 13:00:12 GMT</pubDate>
            <description><![CDATA[ Announced as part of the Back to School Safely: K-12 Cybersecurity Summit at the White House on Aug 7, Proj Cybersafe Schools will support eligible K-12 public school districts with  Zero Trust ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Like other under-resourced organizations, schools face cyber attacks from malicious actors that can impact their ability to safely perform their basic function: teach children. Schools face email, phishing, and ransomware attacks that slow access and threaten leaks of confidential student data. And these attacks have real effects. In a <a href="https://www.gao.gov/products/gao-23-105480">report issued at the end of 2022</a>, the U.S. Government Accountability Office concluded that schools serving kindergarten through 12th grade (K-12) reported significant educational impact and monetary loss due to cybersecurity incidents, such as ransomware attacks. Recovery time can extend from 2 all the way up to 9 months — that’s almost an entire school year.</p><p>Cloudflare’s mission is to help build a better Internet, and we have always believed in helping protect those who might otherwise not have the resources to protect themselves from cyberattack.</p><p>It is against this backdrop that we’re very excited to introduce an initiative aimed at small K-12 public school districts: <a href="https://www.cloudflare.com/lp/cybersafe-schools/">Project Cybersafe Schools</a>. Announced as part of the Back to School Safely: <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/07/biden-harris-administration-launches-new-efforts-to-strengthen-americas-k-12-schools-cybersecurity/">K-12 Cybersecurity Summit</a> at the White House on August 8, 2023, Project Cybersafe Schools will support eligible K-12 public school districts with a package of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> cybersecurity solutions — <i>for free</i>, and <i>with no time limit</i>. These tools will help eligible school districts minimize their exposure to common cyber threats.</p>
    <div>
      <h3>Schools are prime targets for cyberattacks</h3>
      <a href="#schools-are-prime-targets-for-cyberattacks">
        
      </a>
    </div>
    <p>In Q2 2023 alone, Cloudflare blocked an average of 70 million cyber threats each day targeting the U.S. education sector, and saw a 47% increase in DDoS attacks quarter-over-quarter. In September 2022, the <a href="https://www.cnn.com/2022/10/01/us/los-angeles-unified-school-district-ransomware-attack/index.html">Los Angeles Unified School District suffered a cyber attack</a>, and the perpetrators later posted students’ private information on the dark web. Then, in January 2022, the <a href="https://www.npr.org/2022/01/14/1072970219/cyber-attack-in-albuquerque-latest-to-target-public-schools">public school system in Albuquerque, New Mexico</a> was forced to close down for two days following a cyber attack that compromised student data. The list goes on. Between 2016 and 2022, there were <a href="https://www.k12six.org/map">1,619 publicly reported cybersecurity-related incidents</a> aimed at K-12 public schools and districts in the United States.</p><p>As an alliance member of the <a href="https://www.cisa.gov/topics/partnerships-and-collaboration/joint-cyber-defense-collaborative">Joint Cyber Defense Collaborative</a>, Cloudflare began conversations with officials from the Cybersecurity &amp; Infrastructure Security Agency (CISA), the Department of Education, and the White House about how we could partner to protect K-12 schools in the United States from cyber threats. We think that we are particularly well-suited to <a href="/cloudflare-helps-k12-go-back-to-school/">help protect K-12 schools</a> against cyber attacks. For almost a decade, Cloudflare has supported organizations that are particularly vulnerable to cyber threats and lack the resources to protect themselves through projects like <a href="https://www.cloudflare.com/en-gb/galileo/">Project Galileo</a>, the <a href="https://www.cloudflare.com/en-gb/athenian/">Athenian Project</a>, the <a href="/announcing-critical-infrastructure-defense/">Critical Infrastructure Defense Project</a>, and <a href="/project-safekeeping/">Project Safekeeping</a>.</p><p>Unlike many colleges, universities, and even some larger school districts, smaller school districts often lack the capacity to manage cyber threats. The lack of funding and staff make schools prime targets for hackers. These attacks prevent students from learning, put students’ personal information at risk, and cost school districts time and money in the aftermath of the attacks.</p>
    <div>
      <h3>Project Cybersafe Schools: protecting the smallest K-12 public school districts</h3>
      <a href="#project-cybersafe-schools-protecting-the-smallest-k-12-public-school-districts">
        
      </a>
    </div>
    <p>Project Cybersafe Schools will help support small K-12 public school districts by providing <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud email security</a> to protect against a broad spectrum of threats including <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise,</a> multichannel phishing, credential harvesting, and other targeted attacks. Project Cybersafe Schools will also protect against Internet threats with DNS filtering by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites. It can also be deployed to comply with the <a href="https://www.fcc.gov/consumers/guides/childrens-internet-protection-act">Children’s Internet Protection Act</a> (CIPA), which Congress passed in 2000, to address concerns about children’s access to obscene or harmful content on the Internet.</p><p>We believe that Cloudflare can make a meaningful impact on the cybersecurity needs of our small school districts, which allows the schools to focus on what they do best: teaching students. Hopefully, this project will bring privacy, security, and peace of mind to school managers, staff, teachers, and students, allowing them to focus solely on teaching and learning fearlessly.</p>
    <div>
      <h3>What Zero Trust services are available?</h3>
      <a href="#what-zero-trust-services-are-available">
        
      </a>
    </div>
    <p>Eligible K-12 public school districts in the United States will have access to a package of <a href="https://www.cloudflare.com/zero-trust/solutions/">enterprise-level Zero Trust cybersecurity services</a> <i>for free and with no time limit</i> – there is no catch and no underlying obligations. Eligible organizations will benefit from:</p><ul><li><p><b><b><b>Email Protection:</b></b></b> Safeguards inboxes with cloud email security by protecting against a broad spectrum of threats including malware-less Business Email Compromise, multichannel phishing, credential harvesting, and other targeted attacks.</p></li><li><p><b><b><b>DNS Filtering:</b></b></b> Protects against Internet threats with DNS filtering by preventing users from reaching unwanted or harmful online content like ransomware or phishing sites and can be deployed to comply with the Children’s Internet Protection Act (CIPA).</p></li></ul>
    <div>
      <h3>Who can apply?</h3>
      <a href="#who-can-apply">
        
      </a>
    </div>
    <p>To be eligible, Project Cybersafe Schools participants must be:</p><ul><li><p>K-12 public school districts located in the United States</p></li><li><p>Up to 2,500 students in the district</p></li></ul><p>If you think your school district may be eligible, we welcome you to contact us to learn more. To apply please visit: <a href="https://www.cloudflare.com/lp/cybersafe-schools/">https://www.cloudflare.com/lp/cybersafe-schools/</a></p><p>For schools or school districts that do not qualify for Project Cybersafe Schools, Cloudflare has other packages available with educational pricing. If you do not qualify for Project Cybersafe Schools, but are interested in our educational services, please contact us at <a>k-12@cloudflare.com</a>.</p> ]]></content:encoded>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[DNS Filtering]]></category>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">2s8SeX5ZnPbe0oCq2cHDlk</guid>
            <dc:creator>Zaid Zaid</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Area 1 earns SOC 2 report]]></title>
            <link>https://blog.cloudflare.com/area-1-earns-soc-2-report/</link>
            <pubDate>Thu, 08 Jun 2023 14:00:06 GMT</pubDate>
            <description><![CDATA[ Many customers want assurance that the sensitive information they send to us can be kept safe. One of the best ways to provide this assurance is a SOC 2 Type II report ]]></description>
            <content:encoded><![CDATA[ <p></p><p><a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloudflare Area 1</a> is a cloud-native <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> that identifies and blocks attacks before they hit user inboxes, enabling more effective protection against <a href="https://www.cloudflare.com/learning/access-management/spear-phishing/">spear phishing</a>, <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise</a> (BEC), and other advanced threats. Cloudflare Area 1 is part of the <a href="https://www.cloudflare.com/en-gb/zero-trust-hub/">Cloudflare Zero Trust platform</a> and an essential component of a modern security and compliance strategy, helping organizations to reduce their attackers surface, detect and respond to threats faster, and improve compliance with industry regulations and security standards.</p><p>This announcement is another step in our commitment to remaining strong in our security posture.</p>
    <div>
      <h2>Our SOC 2 Journey</h2>
      <a href="#our-soc-2-journey">
        
      </a>
    </div>
    <p>Many customers want assurance that the sensitive information they send to us can be kept safe. One of the best ways to provide this assurance is a <a href="https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement">SOC 2 Type II report</a>. We decided to obtain the report as it is the best way for us to demonstrate the controls we have in place to keep Cloudflare Area 1 and its infrastructure secure and available.  </p><p>Cloudflare Area 1’s SOC 2 Type II report covers a 3 month period from 1 January 2023 to 31 March 2023. Our auditors assessed the operating effectiveness of the 70 controls we’ve implemented to meet the <a href="https://www.aicpa-cima.com/resources/download/2017-trust-services-criteria-with-revised-points-of-focus-2022">Trust Services Criteria</a> for Security, Confidentiality, and Availability.</p><p>We anticipate that the next ask from our customers will be for a SOC 2 Type II report that covers a longer reporting period, so we’ve decided to expand our scope for the Cloudflare Global Cloud Platform SOC 2 Type II report to be inclusive of Cloudflare Area 1 later on this year.</p><p>We are thrilled to reach this milestone and will continue to stay committed to be one of the most trusted platforms.</p><p>For a copy of Cloudflare Area 1’s SOC 2 Type II report, existing customers can obtain one through the <a href="https://developers.cloudflare.com/fundamentals/get-started/basic-tasks/access-compliance-docs/">Cloudflare Dashboard</a>; new customers may also request a copy from your sales representative. For the latest information about our certifications and reports, please visit <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">our Trust Hub</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Area 1 Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email Security]]></category>
            <guid isPermaLink="false">3fXSrjEi1CSSNf11nivFJ</guid>
            <dc:creator>Samuel Vieira</dc:creator>
            <dc:creator>Paul East</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to stay safe from phishing]]></title>
            <link>https://blog.cloudflare.com/stay-safe-phishing-attacks/</link>
            <pubDate>Mon, 13 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Phishing attacks come in all sorts of ways to fool people. Email is definitely the most common, but there are others. Here are some tips to help you catch these scams before you fall for them. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gCRILOV4UHIFWg0Yjm3Cd/832bb46081fca777cf62ece6ae7fbda8/image3-8.png" />
            
            </figure><p>As you wake up in the morning feeling sleepy and preoccupied, you receive an urgent email from a seemingly familiar source, and without much thought, you click on a link that you shouldn't have. Sometimes it’s that simple, and this more than <a href="https://en.wikipedia.org/wiki/Phishing">30-year-old phishing</a> method means chaos breaks loose – whether it’s your personal bank account or social media, where an attacker also begins to trick your family and friends; or at your company, with what could mean systems and data being compromised, services being disrupted, and all other subsequent consequences. Following up on our “<a href="/50-most-impersonated-brands-protect-phishing">Top 50 Most Impersonated Brands in phishing attacks</a>” post, here are some tips to catch these scams before you fall for them.</p><p>We’re all human, and responding to or interacting with a malicious email remains the primary way to breach organizations. According to <a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>, 90% of cyber attacks begin with a phishing email, and losses from a similar type of phishing attack, known as business email compromise (BEC), are a <a href="https://www.ic3.gov/Media/Y2022/PSA220504">$43 billion</a> problem facing organizations. One thing is for sure, phishing attacks are getting <a href="https://www.zdnet.com/article/phishing-attacks-are-getting-scarily-sophisticated-heres-what-to-watch-out-for/">more sophisticated</a> every day thanks to emerging tools like <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">AI</a> chatbots and the expanded usage of various communication apps (Teams, Google Chat, Slack, LinkedIn, etc.).</p>
    <div>
      <h3>What is phishing? Where it starts (the hacker’s foot in the door)</h3>
      <a href="#what-is-phishing-where-it-starts-the-hackers-foot-in-the-door">
        
      </a>
    </div>
    <p>Seems simple, but it is always good to remind everyone in simple terms. <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">Email phishing</a> is a deceptive technique where the attacker uses various types of bait, such as a convincing email or link, to trick victims into providing sensitive information or downloading malware. If the bait works — the attacker only needs it to work once — and the victim clicks on that link, the attacker now has a foot in the door to carry out further attacks with potentially devastating consequences. Anyone can be fooled by a general “phish” — but these attacks can also be focused on a single target, with specific information about the victim, called <a href="https://www.cloudflare.com/learning/access-management/spear-phishing/">spear phishing</a>.</p><p>Recent examples of phishing include <a href="https://www.zdnet.com/article/reddit-was-hit-with-a-phishing-attack-how-it-responded-is-a-lesson-for-everyone/">Reddit</a> as a target, Twilio, and also Cloudflare in a similar attack around the same time — we explain here “<a href="/2022-07-sms-phishing-attacks/">The mechanics of a sophisticated phishing scam and how we stopped it</a>” thanks to our own use of <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One products</a>. In some cases, a <a href="https://www.zdnet.com/article/lastpass-breach-hackers-put-malware-on-engineers-home-computer-to-steal-their-password/">home computer</a> of an employee as a target can be the door opening for hackers in what is a few weeks later a major breach.</p><p>Some alerts to bear in mind include the UK's <a href="https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest">National Cyber Security Centre</a> (NCSC), that phishing attacks are targeting individuals and organizations in a range of sectors. The <a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">White House</a> National Cybersecurity Strategy (<a href="/the-white-houses-national-cybersecurity-strategy-asks-the-private-sector-to-step-up-to-fight-cyber-attacks-cloudflare-is-ready/">Cloudflare is ready</a> for that) also highlights those risks. <a href="https://www.politico.eu/article/germany-must-overhaul-its-national-security-strategy-interior-minister-says/">Germany</a>, <a href="https://asia.nikkei.com/Politics/Japan-to-upgrade-cyber-defense-allowing-preemptive-measures">Japan</a> or <a href="https://www.theregister.com/2022/12/11/asia_tech_news_roundup/">Australia</a> are working on a similar approach.</p><p>Without further ado, here are some tips to protect yourself from phishing attacks.</p>
    <div>
      <h3>Tips for Staying Safe Online: How to Avoid Being Reeled in By Phishing Scams</h3>
      <a href="#tips-for-staying-safe-online-how-to-avoid-being-reeled-in-by-phishing-scams">
        
      </a>
    </div>
    <ul><li><p><b>Don’t click strategy.</b> If you get an email from your bank or government agencies like the IRS, instead of clicking on a link in the email, go directly to the website itself.</p></li><li><p><b>Look out for misspellings or strange characters in the sender’s email address.</b> Phishing attempts often rely on look-alike domains or ‘from’ emails to encourage clicks. Common tactics are extra or switched letters (microsogft[.]com), omissions (microsft[.]com) or characters that look alike (the letter o and 0, or micr0soft[.]com).</p></li></ul><p>Here's a classic brand impersonation phish, using Chase as the trusted lure:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/h1SMR9A1ycmg7Dj9HVOE6/6b9d3d10adb910a752f3e54cb9e4187b/image1-13.png" />
            
            </figure><p><i>The link in the text body appears to be a Chase domain, but when clicked, it actually opens a SendGrid URL (a known email delivery platform). It then redirects the user to a phishing site impersonating Chase.</i></p><ul><li><p><b>Think before clicking links to “unlock account” or “update payment details.”</b> Technology services were one of the top industries to be used in phishing campaigns, due to the personal information that can be found in our email, online storage, and social media accounts. Hover over a link and confirm it’s a URL you’re familiar with before clicking.</p></li><li><p><b>Be wary of financial-related messages.</b> Financial institutions are the most likely industry to be phished, so pause and assess any messages asking to accept or make a payment.</p></li><li><p><b>Look out for messages that create a sense of urgency.</b> Emails or text messages that warn of a final chance to pick up a package, or last chance to confirm an account, are likely fake. The rise in online shopping during the pandemic has made retail and logistics/shipping companies a hot target for these types of phishing attempts.</p><p>Both financial and package delivery scams typically use the SMS phishing attack, or <a href="https://www.cloudflare.com/learning/access-management/smishing/">smishing</a>, and are related to the attacker’s use of SMS messages to lure the victims. Cloudflare was the target of this type of phishing a few <a href="/2022-07-sms-phishing-attacks/">months ago</a> (it was stopped). Next, we show you an example of a text message from that thwarted attack:</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2cEXTEgMEHvKMsTaQy5rhU/aac7696a55df7022c934738f5f3619e8/image4-8.png" />
            
            </figure><ul><li><p><b>If things sound too good to be true, they probably are.</b> Beware of "limited time offers" for free gifts, exclusive services, or great deals on trips to Hawaii or the Maldives. Phishing emails target our senses of satisfaction, pleasure, and excitement to compel us to make split second decisions without thinking things through. These types of tactics are lures for a user to click on a link or provide sensitive information. Pause, even if it's for a few seconds, and quickly look up the offer online to see if others have received similar offers.</p></li><li><p><b>Very important message from a very important…</b> Phishing emails sometimes mimic high-ranking individuals, urging urgent action such as money transfers or credential sharing. Scrutinize emails with such requests, and verify their authenticity. Contact your manager if the sender is a CEO. For unfamiliar politicians, assess the request's feasibility before responding.</p></li><li><p><b>The message body is full of errors (but beware of AI tools).</b> Poor grammar, spelling, and sentence structure may indicate that an email is not from a reputable source. That said, recent <a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">AI</a> text tools have made it easier for hackers or bad actors to create convincing and error-free copies.</p></li><li><p><a href="https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/romance-scams"><b>Romance scam</b></a> <b>emails.</b> These are emails where scammers adopt a fake online identity to gain a victim's affection and trust. They may also send an email that appears to have been sent in error, prompting the recipient to respond and initiating a conversation with the fraudster. This <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">tactic</a> is used to lure victims.</p></li><li><p><b>Use a password manager.</b> Password managers will verify if the <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain name</a> matches what you expect, and will warn you if you try to fill in your password on the wrong domain name.</p></li></ul><p>If you want to apply even greater scrutiny to a potential phishing email, you can check out our <a href="https://www.cloudflare.com/learning/email-security/how-to-identify-a-phishing-email/">learning center</a> to understand what happens when an email does not pass standard authentication methods like SPF, DKIM, or DMARC.</p><p>A few more Cloudflare related trends, besides the <a href="/50-most-impersonated-brands-protect-phishing">Top 50 Most Impersonated Brands</a>, comes from <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Cloudflare Area 1</a>. In 2022, our services focused on email protection <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">identified</a> and kept 2.3 billion unwanted messages out of customer inboxes. On average, we blocked 6.3 million messages per day. That’s almost 44,000 every 10 minutes, which is the time it takes to read a blog post like this one.</p><p>Typically, the type of email threats most used (looking at our Area 1 January 2023 data) are: identity deception, malicious links, brand impersonation, malicious attachments, scam, extortion, account compromise. And there’s also <a href="https://www.cloudflare.com/learning/email-security/what-is-vishing/">voice phishing</a>.</p><p>Voice phishing, also known as vishing, is another common threat and is related to the practice of tricking people into sharing sensitive information through telephone calls. Victims are led to believe they are talking to a trusted entity, such as the tax authority, their employer, or an airline they use. <a href="https://www.cloudflare.com/learning/email-security/what-is-vishing/">Here</a>, you can learn more about protecting yourself or your company from voice phishing.</p><p>Another type of attack is the <a href="https://en.wikipedia.org/wiki/Watering_hole_attack">watering hole attack</a>, where hackers identify websites frequented by users within a targeted organization and then compromise those websites to distribute malware. Those are often times associated with <a href="https://www.ncsc.gov.uk/collection/supply-chain-security/watering-hole-attacks">supply chain</a> exploitation.</p><p>Next, we show a phishing email example that was received from a real vendor that got an email account hacked in what is called vendor invoice fraud:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5C0DZNm32YUwgRjGmPdEid/313f535eb5a0329856426795f1412fd2/image2-7.png" />
            
            </figure><p>Last but not least in our list of examples, there’s also Calendar phishing, where a fraudster could potentially use a cloud email account to inject fake invites into target employee calendars. Those are detected and avoided with products in our <a href="/phishing-threat-indicators-in-zero-trust/">Cloudflare Zero Trust</a> product.</p>
    <div>
      <h3>Email Link Isolation approach: a safety net for phishing attacks</h3>
      <a href="#email-link-isolation-approach-a-safety-net-for-phishing-attacks">
        
      </a>
    </div>
    <p>As we wrote <a href="/area1-eli-ga/">recently</a> for <a href="https://www.cloudflare.com/cio-week/updates/">CIO Week</a>, there’s also a possible safety net, even if the best trained user mistakes a good link from a bad link. Leveraging the <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> service, <a href="/area1-eli-ga/">Email Link Isolation</a> turns Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/products/email-security/">cloud email security</a> into the most comprehensive <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">solution</a> when it comes to protecting against phishing attacks that go beyond just email. It rewrites and isolates links that could be exploited, keeps users vigilant by alerting them of the uncertainty around the website they’re about to visit, and protects against malware and vulnerabilities. Also, in true Cloudflare fashion, it’s a one-click deployment. Check the related <a href="/area1-eli-ga/">blog post</a> to learn more.</p><p>That said, not all malicious links come from emails. If you're concerned about malicious links that may come through Instant Messaging or other communication tools (Slack, iMessage, Facebook, Instagram, WhatsApp, etc), <a href="https://www.cloudflare.com/products/zero-trust/">Zero Trust</a> and <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation</a> are an effective way to go.</p><p>Another way to protect yourself from phishing attacks is to use <a href="https://www.cloudflare.com/learning/access-management/what-is-two-factor-authentication/">two-factor authentication</a> (2FA). It works as an extra layer of security for user accounts, making it more difficult for attackers to gain unauthorized access. By requiring a second factor, even if an attacker has your password, they still cannot access your account.</p><p>While 2FA by a code generated by a mobile app or sent via SMS (also prone to SIM jacking attacks) is an option, those could also be asked for by phishing sites. The safest way to use 2FA is by using hardware security keys, which are tied to the genuine site. This is why Cloudflare has been keen to highlight that method, both <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">internally</a> and <a href="https://www.cloudflare.com/press-releases/2022/cloudflare-democratizes-hardware-security-keys/">externally</a> or in our <a href="https://www.cloudflare.com/products/zero-trust/phishing-resistant-mfa/">products</a>.</p>
    <div>
      <h3>Conclusion: better safe than sorry</h3>
      <a href="#conclusion-better-safe-than-sorry">
        
      </a>
    </div>
    <p>As we saw, email is one of the most ubiquitous and also most exploited tools that businesses use every single day. Baiting users into clicking malicious links within an email has been a particularly long-standing tactic for the vast majority of bad actors, from the most sophisticated criminal organizations to the least experienced attackers. So, remember, when online:</p><p>Be cautious. Be <a href="https://www.cloudflare.com/products/zero-trust/email-security/">prepared</a>. Be safe.</p><p>If you want to learn more about email security, you can visit our <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">Learning Center</a> or reach out for a complimentary phishing <a href="https://www.cloudflare.com/lp/emailsecurity/">risk assessment</a> for your organization.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">jUpcx0tuA1pNEBGyI9vBU</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Email Link Isolation: your safety net for the latest phishing attacks]]></title>
            <link>https://blog.cloudflare.com/area1-eli-ga/</link>
            <pubDate>Wed, 11 Jan 2023 13:01:00 GMT</pubDate>
            <description><![CDATA[ Email Link Isolation is your safety net for the odd links that end up in people’s inboxes, and they may click. This added protection turns Cloudflare Area 1 into the most comprehensive email security solution when it comes to protecting against phishing attacks. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ebDbzAoZi18H8cP1ypwtC/7e6c377e1ad9672bda44b7c866f59243/image3-13.png" />
            
            </figure><p>Email is one of the most ubiquitous and also most exploited tools that businesses use every single day. Baiting users into clicking malicious links within an email has been a particularly long-standing tactic for the vast majority of bad actors, from the most sophisticated criminal organizations to the least experienced attackers.</p><p>Even though this is a commonly known approach to gain account access or <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">commit fraud</a>, users are still being tricked into clicking malicious links that, in many cases, lead to exploitation. The reason is simple: even the best trained users (and security solutions) cannot always distinguish a good link from a bad link.</p><p>On top of that, securing employees' mailboxes often results in multiple vendors, complex deployments, and a huge drain of resources.</p><p>Email Link Isolation turns <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Cloudflare Area 1</a> into the most comprehensive <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a> when it comes to <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">protecting against phishing attacks</a>. It rewrites links that could be exploited, keeps users vigilant by alerting them of the uncertainty around the website they’re about to visit, and protects against malware and vulnerabilities through the user-friendly <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation service</a>. Also, in true Cloudflare fashion,  it’s a one-click deployment.</p>
    <div>
      <h3>Protecting against deceptive links</h3>
      <a href="#protecting-against-deceptive-links">
        
      </a>
    </div>
    <p>With more than a couple dozen customers in beta and over one million links protected (so far), we can now clearly see the significant value and potential that this solution can deliver. To extend these benefits to more customers and continue to expand on the multitude of ways we can apply this technology, <b>we’re making Email Link Isolation generally available (GA) starting today</b>.</p><p>Email Link Isolation is included with Cloudflare Area 1 enterprise plan at no extra cost, and can be enabled with three clicks:</p><p>1. Log in to the Area 1 portal.</p><p>2. Go to Settings (the gear icon).</p><p>3. On Email Configuration, go to Email Policies &gt; Link Actions.</p><p>4. Scroll to Email Link Isolation and enable it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w3slBSqFADNmJi4LbnRUt/b2d8da9f9a91daffe7f8857f538ea517/image5-6.png" />
            
            </figure>
    <div>
      <h3>Defense in layers</h3>
      <a href="#defense-in-layers">
        
      </a>
    </div>
    <p>Applying multiple layers of defense becomes ever more critical as threat actors continuously look for ways to navigate around each security measure and develop more complex attacks. One of the best examples that demonstrates these evolving techniques is a deferred phishing attack, where an embedded URL is benign when the email reaches your email security stack and eventually your users’ inbox, but is later weaponized post-delivery.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3x69sIoIeC3ld5laLWAgEt/e8e4687cfb460e0749d1e4c367c03c24/image4-10.png" />
            
            </figure><p>To combat evolving email-borne threats, such as malicious links, Area 1 continually updates its <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning (ML) models</a> to account for all potential attack vectors, and leverages post-delivery scans and retractions as additional layers of defense. And now, customers on the <a href="https://www.cloudflare.com/plans/enterprise/">Enterprise plan</a> also have access to Email Link Isolation as one last defense - a safety net.</p><p>The key to successfully adding layers of security is to use <a href="https://zerotrustroadmap.org/">a strong Zero Trust suite</a>, not a disjointed set of products from multiple vendors. Users need to be kept safe without disrupting their productivity - otherwise they’ll start seeing important emails being quarantined or run into a poor experience when accessing websites, and soon enough they’ll be the ones looking for ways around the company’s security measures.</p>
    <div>
      <h3>Built to avoid productivity impacts</h3>
      <a href="#built-to-avoid-productivity-impacts">
        
      </a>
    </div>
    <p>Email Link Isolation provides an additional layer of security with virtually no disruption to the user experience. It’s smart enough to decide which links are safe, which are malicious, and which are still dubious. Those dubious links are then changed (rewritten to be precise) and Email Link Isolation keeps evaluating them until it reaches a verdict with a high degree of confidence. When a user clicks on one of those rewritten links, Email Link Isolation checks for a verdict (benign or malign) and takes the corresponding action - benign links open in the local browser as if they hadn’t been changed, while malign links are prevented from opening altogether.</p><p>Most importantly, when Email Link Isolation is unable to confidently determine a verdict based on all available intelligence, an interstitial page is presented to ask the user to be extra vigilant. The interstitial page calls out that the website is suspicious, and that the user should refrain from entering any personal information and passwords unless they know and fully trust the website. Over the last few months of beta, we’ve seen that over two thirds of users don’t proceed to the website after seeing this interstitial - that’s a good thing!</p><p>For the users that still want to navigate to the website after seeing the interstitial page, Email Link Isolation uses Cloudflare Browser Isolation to automatically open the link in an isolated browser running in Cloudflare’s closest data center to the user. This delivers an experience virtually indistinguishable from using the local browser, thanks to our Network Vector Rendering (NVR) technology and Cloudflare’s expansive, low-latency network. By opening the suspicious link in an isolated browser, the user is protected against potential browser attacks (including malware, zero days, and other types of malicious code execution).</p><p><b>In a nutshell, the interstitial page is displayed when Email Link Isolation is uncertain about the website, and provides another layer of awareness and protection against phishing attacks. Then, Cloudflare Browser Isolation is used to protect against malicious code execution when a user decides to still proceed to such a website.</b></p>
    <div>
      <h3>What we’ve seen in the beta</h3>
      <a href="#what-weve-seen-in-the-beta">
        
      </a>
    </div>
    <p>As expected, the percentage of rewritten links that users actually click is quite small (single digit percentage). That’s because the majority of such links are not delivered in messages the users are expecting, and aren’t coming from trusted colleagues or partners of theirs. So, even when a user clicks on such a link, they will often see the interstitial page and decide not to proceed any further. We see that less than half of all clicks lead to the user actually visiting the website (in Browser Isolation, to protect against malicious code that could otherwise be executing behind the scenes).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/472qL0UBYcnHd1n1oFTegD/67264b3613f47281febb5a50b63e8ca5/image1-24.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7iB2Pyy7fHHerMwX7GCbrJ/8991046688880e6eef97ae7ec130dd3d/image2-16.png" />
            
            </figure><p>You may be wondering why we’re not seeing a larger amount of clicks on these rewritten links. The answer is quite simply that link Email Link Isolation is indeed that last layer of protection against attack vectors that may have evaded other lines of defense. Virtually all the well crafted phishing attacks that try and trick users into clicking malicious links are already being stopped by the Area 1 email security, and such messages don’t reach users’ inboxes.</p><p>The balance is very positive. From all the customers using Email Link Isolation beta in production, some Fortune 500, we received no negative feedback on the user experience. <b>That means that we’re meeting one of the most challenging goals - to provide additional security without negatively affecting users and without adding the burden of tuning/administration to the SOC and IT teams.</b></p><p>One interesting thing we uncover is how valuable our customers are finding our click-time inspection of link shorteners. The fact that a shortened URL (e.g. bit.ly) can be modified at any time to point to a different website has been making some of our customers anxious. Email Link Isolation inspects the link at time-of-click, evaluates the actual website that it’s going to open, and proceeds to open locally, block or present the interstitial page as adequate. We’re now working on full link shortener coverage through Email Link Isolation.</p>
    <div>
      <h3>All built on Cloudflare</h3>
      <a href="#all-built-on-cloudflare">
        
      </a>
    </div>
    <p>Cloudflare’s intelligence is driving the decisions of what gets rewritten. We have earlier signals than others.</p><p>Email Link Isolation has been built on Cloudflare’s unique capabilities in many areas.</p><p>First, because Cloudflare sees enough Internet traffic for us to confidently identify new/low confidence and potentially dangerous domains earlier than anyone else - leveraging the Cloudflare intelligence for this early signal is key to the user experience, to not add speed bumps to legitimate websites that are part of our users’ daily routines. Next, we’re using <a href="https://workers.cloudflare.com/">Cloudflare Workers</a> to process this data and serve the interstitial without introducing frustrating delays to the user. And finally, only <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> can protect against malicious code with a low-latency experience that is invisible to end users and feels like a local browser.</p><p>If you’re not yet a Cloudflare Area 1 customer, start your free trial and phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">5s7YqaliwrZdTs3OtmUwUQ</guid>
            <dc:creator>João Sousa Botto</dc:creator>
        </item>
        <item>
            <title><![CDATA[Expanding Area 1 email security to the Athenian Project]]></title>
            <link>https://blog.cloudflare.com/expanding-area-1-email-security-to-the-athenian-project/</link>
            <pubDate>Mon, 12 Dec 2022 14:00:00 GMT</pubDate>
            <description><![CDATA[ We are excited to share that we have grown our offering under the Athenian Project to include Cloudflare’s Area 1 email security suite to help state and local governments protect against a broad  ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vWG8T54q5llgOMlTabTE8/61bc5d6c0fa57fb7ea456532d50f6d47/image2-16.png" />
            
            </figure><p>Election security encompasses a wide variety of measures, including the protection of voting machines, election office networks, voter registration databases, and other systems that manage the electoral process. At Cloudflare, we have reported on threats to state and local governments under the <a href="https://www.cloudflare.com/athenian/">Athenian Project</a>, how we prepare political campaigns and state parties under <a href="https://www.cloudflare.com/campaigns/usa/">Cloudflare for Campaigns</a> for election season, and our work with organizations that report on election results and voting rights groups under <a href="https://www.cloudflare.com/galileo/">Project Galileo.</a></p><p>Since the 2022 US midterm elections, we have been thinking about how we help state and local governments <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">deflect larger cyber threats</a> that target the election community and have been analyzing the biggest problems they are facing. In October 2022, Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency, <a href="https://apnews.com/article/2022-midterm-elections-technology-d6bf92f594343d7a489d40394e56e2a1">said</a>, “The current election threat environment is more complex than it has ever been.” Amid threats, intimidation toward election workers, and cyber attacks against election infrastructure and operations, preparing for elections is no easy task.</p><p>At Cloudflare, our mission is to help build a better Internet. The Internet plays a key role in promoting democracy and ensuring constituents’ access to information. With this, we are excited to share that we have grown our offering under the Athenian Project to include Cloudflare’s Area 1 email security suite to help state and local governments protect against a broad spectrum of <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing attacks</a> to keep voter data safe and secure.</p>
    <div>
      <h3>Our work in protecting elections</h3>
      <a href="#our-work-in-protecting-elections">
        
      </a>
    </div>
    <p>To understand why we have expanded our product set, we need to look back on how our services have helped state and local governments during election time. Under the Athenian Project, we have provided our highest level of Cloudflare services—the <a href="https://www.cloudflare.com/plans/enterprise/">Enterprise plan</a>—for free to state and governments that run elections. The idea originally was that, just like every other Internet property, election websites need to be fast, they need to be reliable, and they need to be secure. Yet, scarce budgets too often prevent governments from getting the right resources to prevent attacks and stay online.</p><p>With this, we launched the Athenian Project in 2017. It includes many of our core web services, such as <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS protection</a>, <a href="https://www.cloudflare.com/learning/security/what-is-a-firewall/">Web Application Firewall</a>, <a href="https://www.cloudflare.com/learning/ssl/what-is-ssl/">SSL encryption</a>, and more security features that focus on web applications. We have been able to provide these services to local governments in 31 states and currently protect 359 election entities in the United States.</p><p>We have expanded our product set at Cloudflare with Workers, Pages, <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, and <a href="https://www.cloudflare.com/network-security/">network security solutions</a>. With this, we wanted to understand how we can better support the election community that we work with every day on the Athenian Project.</p>
    <div>
      <h3>We knew we could provide more</h3>
      <a href="#we-knew-we-could-provide-more">
        
      </a>
    </div>
    <p>Internally, we brainstormed on the most pressing issues that face the election community and overall Internet ecosystem. We also asked new and existing Athenian participants on the largest pain points they have when it comes to securing their internal networks and applications. We received a range of answers, from fears of a DDoS attack on election night, to <a href="https://www.cloudflare.com/learning/security/threats/zero-day-exploit/">zero-day exploits</a>, <a href="https://www.cloudflare.com/learning/security/threats/on-path-attack/">on-path attacks</a>, and <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware attacks</a>. Many of the same themes came up, especially for small counties that run elections with a huge fear of phishing and <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">ransomware</a> attacks.</p><p>Despite email's importance as a communication method, many types of email security still are not built into email by default. As a result, email is a major <a href="https://www.cloudflare.com/learning/security/glossary/attack-vector/">attack vector</a> for organizations large and small, and for individual people as well. We have seen <a href="/2022-07-sms-phishing-attacks/">firsthand</a> phishing attempts that take advantage of human psychology to encourage quick —and unfortunate— decision-making. Once an attacker has infiltrated a network, they can easily <a href="https://www.cloudflare.com/learning/security/glossary/what-is-lateral-movement/">move laterally</a> undetected and impact a wide range of sensitive internal systems.</p><p>That is why <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> plays a critical role in preemptive defenses against ransomware attacks. Since many of these attacks start with a malicious or phishing email, effective email security can act as a frontline defense against ransomware, and stop these attacks before they reach inboxes. Due to the ease with which threats can be blocked before they reach an election official’s inbox, we were excited to work with those in the election space to find the best way to make these products available.</p><p>Typically, when we offer new security products under our <a href="https://www.cloudflare.com/impact/">Impact</a> projects, we collaborate with external stakeholders. One example is the civil society groups that we partner with under <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>; many of them work in the election community and at government agencies, such as CISA’s Joint Cyber Defense Collaborative (JCDC). These partnerships help us understand how to provide these security tools in a responsible and sustainable way.</p>
    <div>
      <h3>How one North Carolina county uses Area 1 email security</h3>
      <a href="#how-one-north-carolina-county-uses-area-1-email-security">
        
      </a>
    </div>
    <p>Months before the 2022 US midterm elections, we reached out to a few state and local governments that currently use Zero Trust products, such as Access and Gateway, to discuss email security.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ARiugvSS1AJNra3cbhpTl/57cd998d1495af17cf3560ea735d4db8/Screenshot-2022-12-06-at-13.47.37.png" />
            
            </figure><p>One of our Athenian participants that was eager to work with us on this expansion was Rowan County, North Carolina. For Randy Cress, CIO for Rowan County, election season means all hands on deck for IT staff in order to secure their .gov site that provides accurate, <a href="https://www.cloudflare.com/learning/security/what-is-information-security/">secure information</a> to voters.</p><p>In 2020, <a href="https://www.cloudflare.com/election-security/">Rowan County reported</a> that Cloudflare helped them tackle a 400% increase in traffic on a limited budget which allowed them to refocus resources on other county initiatives. When it comes to phishing attacks, Randy wanted to shield county employees from <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing</a> attacks and block malicious threats automatically.</p><blockquote><p>“<i>Prior to Area 1 Security, we were using Office 365 email protection with limited insight for the specifics for messages that were quarantined. While cloud services from Microsoft are continually evolving, we were looking to reduce complexity to support security functions within our environment, allowing us to continue implementing new layers of defense.</i>”</p></blockquote><p>Deploying <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1</a> gave the county the ability to preemptively discover and eliminate phishing attacks before they inflict damage in their environment. Randy added, <i>“Our team was able to fully onboard prior to the official onboarding call in less than 30 minutes with Cloudflare. We were able to focus on features and specifics of the product offering in lieu of time spent in configuration mode and troubleshooting. Since we are using Cloudflare for</i> <a href="https://www.cloudflare.com/learning/dns/what-is-dns/"><i>DNS</i></a> <i>and DDoS protection, the changes were extremely easy and there were no interruptions to our mail delivery process.”</i></p><p>For the 2022 US midterm elections, Randy reported, "<i>Leading up to the elections, reports within our Area 1 dashboard indicated 2x as many inbound malicious emails from the same time period in October 2022. We saw</i> <a href="https://www.cloudflare.com/learning/bots/what-is-credential-stuffing/"><i>credential harvesting</i></a> <i>as the top threat, and we are easily able to see which users are targeted for email compromise. With Area 1 Security under the Athenian Project, we were able to add additional layers of security to our organization, as it allowed us to preemptively defend against malicious messages before an employee can click on a malicious link. This gives us comfort knowing that Cloudflare is our first line of defense, so we can focus on providing a secure voting process for the constituents of Rowan County."</i></p>
    <div>
      <h3>Area 1 and the Athenian Project</h3>
      <a href="#area-1-and-the-athenian-project">
        
      </a>
    </div>
    <p>Cloudflare Area 1 email security is a cloud-native <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">service</a> that stops phishing attacks and can be used with Enterprise accounts under the Athenian Project. If you are a state or local government that is interested in learning more about the Athenian Project, please apply on our website: <a href="https://www.cloudflare.com/athenian/">https://www.cloudflare.com/athenian/</a>.</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Athenian Project]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">3cw4wpK0wsGTFy3doWe2RT</guid>
            <dc:creator>Jocelyn Woolbright</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare helps secure the inboxes of democracy]]></title>
            <link>https://blog.cloudflare.com/securing-the-inboxes-of-democracy/</link>
            <pubDate>Mon, 12 Dec 2022 14:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare email security tool worked hard in the 2022 midterm elections to ensure that the email inboxes of those seeking office were secure. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78XAHfAo8IhaPP4lsOUyx3/1f7873e7bfc7a507f797c007c69952e2/image2-6.png" />
            
            </figure><p>We at Cloudflare believe that every candidate, no matter their political affiliation, should be able to operate their campaign without having to worry about the risk of cyberattacks. Malicious attackers such as nation-state threat actors, those seeking monetary reward, or those with too much time on their hands often disagree with our mission and aim to wreak havoc on the democratic process.</p>
    <div>
      <h3>Protecting Email Inboxes Is Key In Stopping Attacks</h3>
      <a href="#protecting-email-inboxes-is-key-in-stopping-attacks">
        
      </a>
    </div>
    <p>In the past years, malicious actors have used email as their primary threat vector when trying to disrupt election campaigns. A quick search online shows how active attackers still are in trying to compromise election official’s email inboxes.<sup>1</sup> Over 90% of damages done to any organization are caused by a phishing attack, making protecting email inboxes a key focus. A well crafted phishing email paired, or an errant click could give an attacker the opportunity to see sensitive information, disseminate false information to voters, or steal campaign donations.</p><p>For the United States 2022 midterm elections, Cloudflare protected the inboxes of over 100 campaigns, election officials and public organizations supporting elections. These campaigns ranged from new officials seeking spots in their local elections to incumbents in the national government. In the three months leading up to the recent elections, Cloudflare processed over 20 million emails and stopped around 150K phishing attacks from making their way into campaign officials' email inboxes.</p>
    <div>
      <h3>Political Campaigns Are Attacked Consistently</h3>
      <a href="#political-campaigns-are-attacked-consistently">
        
      </a>
    </div>
    <p>Some campaigns were targeted more than others. For example, the campaign of a specific incumbent seeking re-election in the US Senate saw their staff members receiving over 35 malicious emails on average every day. And attackers were not just phishing for credentials but also trying to impersonate officials. We saw over 10 thousand emails sent in the three-month span that were using the names of those running for office without their permission.</p><p>Below are the metrics we saw from a senator’s campaign who attackers frequently tried to phish.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Qqld6iHUc4g6vmQfBnYG2/f09c850caaf95106cc5c78f879c57bb3/image4-4.png" />
            
            </figure><p>A candidate for the US House of Representatives saw their staff members receive an email with the subject “Staff Payroll Review” that asked them to access a document link.</p><p>Looking at the email, it would be tough to distinguish it from a valid internal email. It contained a valid email footer and branding that is consistent with the campaign. However, Area 1 models found several discrepancies within the metadata of the email and marked it as malicious.</p><p>Our models found that the domain sending these emails was suspicious based on how similar it was to the representative's actual campaign email. We refer to this as domain proximity. Also analyzing the link found in the email found that it was recently registered, further adding suspicion to the validity of the email.</p><p>Taking in all the data points, Area 1 made sure that the email never made it to any campaign staff’s mailbox and prevented the loss of data and money.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LOQBeTP2cngDdnNHsknQf/84756044f88b666e5ea9607e7f851f1d/image3-1.png" />
            
            </figure><p>Another common attack campaigns see is the use of malicious attachments. These attachments can range from containing ransomware to data uploaders. The goal is to either slow down the politician’s campaign or <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate</a> sensitive information.</p><p>Attackers will use misdirection by either changing the extension of the attached file or by mentioning in the body of the email that the attachment is something more innocuous. We saw this in action for another campaign where a staffer was sent a targeted email asking them to download a purchase order.</p><p>Someone who processes hundreds of purchase orders a day does not have the time to thoroughly scrutinize every email and instead will focus on getting the money paid, so operations are not halted. Area 1’s models saved the staffer time and assessed this email to be malicious.</p><p>Our models first noticed that the attachment was a 7-Zip file called PO567.7z. Most purchase orders are sent via PDF so seeing it being sent as a 7z compressed file was concerning. Another data point the models assessed as being anomalous was the poor sentiment. The email not only has a glaring  grammatical mistake (i.e. “Dear Info,”) but also had poor message tone since it lacked common information found in legitimate purchase order emails.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Gp3XVdP5vXeHdlUnwfsBn/63dd659f2abec7758e6988501639ec42/image1-9.png" />
            
            </figure><p>All these signals, combined with the fact that this is the first time the recipient has ever received communications from the sender, triggered Area 1 to stop the email from making it into any mailbox.</p><p>These examples speak about the trust that campaigns place in Cloudflare. Our ability to scan millions of emails and prevent dangerous ones from making it into mailboxes while allowing safe ones to reach their intended recipients with no interruptions is why so many campaigns chose Cloudflare’s Area 1 product to secure their mailboxes and by extension secure our democratic institutions.</p>
    <div>
      <h3>Cloudflare’s Area 1 Solution</h3>
      <a href="#cloudflares-area-1-solution">
        
      </a>
    </div>
    <p>All this is possible because of Area 1’s preemptive campaign discovery and machine learning algorithms which analyze various threat signals, from email attachments, to the sender's domain, to sentiment within the email itself in order to assess whether an email is malicious or not.</p><p>We also made Area 1 easily deployable, ensuring that campaigns are protected right away rather than having to spend time configuring hardware, agents, or appliances. Cloudflare also knows that election campaigns struggle to apply the appropriate email hygiene and authentication controls, stipulated by industry standards (such as SPF / DKIM / DMARC).</p><p>These can be complex and take time to implement. The rapid cycle of new campaigns makes it harder to set up the right email authentication controls that conform with industry best practices. Given that, it is all the more vital to ensure there are strong inbound technical controls against phishing and email-based attacks; letting campaigns focus on what's most important - spreading their message to their constituents in the most effective &amp; secure manner possible.We know that those who seek to become political leaders have a target on their backs from attackers looking to disrupt the democratic process.</p><p>At Cloudflare, we believe in creating a better Internet and that means ensuring that <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">inboxes remain secure</a>. If you would like to learn more about how Area 1 works and other ways we protect email inboxes, please check out the Area 1 product page <a href="https://www.cloudflare.com/products/zero-trust/email-security/">here</a>.</p><p>...</p><p><sup>1. </sup><a href="https://www.cbsnews.com/feature/election-hacking/">https://www.cbsnews.com/feature/election-hacking/</a></p><p></p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">673KHQmNbUYisO2COSZZg</guid>
            <dc:creator>Ayush Kumar</dc:creator>
        </item>
        <item>
            <title><![CDATA[Click Here! (safely): Automagical Browser Isolation for potentially unsafe links in email]]></title>
            <link>https://blog.cloudflare.com/safe-email-links/</link>
            <pubDate>Thu, 29 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ There’s always a cat and mouse game between hackers and security companies. New attacks try to weaponize website links after emails have been delivered to mailboxes, and Email Link Isolation is here to revolutionize protection against those attacks. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We're often told not to click on 'odd' links in email, but what choice do we really have? With the volume of emails and the myriad of SaaS products that companies use, it's inevitable that employees find it almost impossible to distinguish a good link before clicking on it. And that's before attackers go about making links harder to inspect and hiding their URLs behind tempting "Confirm" and "Unsubscribe" buttons.</p><p>We need to let end users click on links and have a safety net for when they unwittingly click on something malicious — let’s be honest, it’s bound to happen even if you do it by mistake. That safety net is Cloudflare's Email Link Isolation.</p>
    <div>
      <h2>Email Link Isolation</h2>
      <a href="#email-link-isolation">
        
      </a>
    </div>
    <p>With Email Link Isolation, when a user clicks on a suspicious link — one that email security hasn’t identified as ‘bad’, but is still not 100% sure it’s ‘good’ — they won’t immediately be taken to that website. Instead, the user first sees an interstitial page recommending extra caution with the website they’ll visit, especially if asked for passwords or personal details.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/176fAKaEbWz4ESe4erOMOc/21dc4ffb698a1cbee7d6083be0ade544/image1-78.png" />
            
            </figure><p>From there, one may choose to not visit the webpage or to proceed and open it in a remote isolated browser that runs on Cloudflare’s global network and not on the user’s local machine. This helps protect the user and the company.</p><p>The user experience in our isolated browser is virtually indistinguishable from using one’s local browser (we’ll talk about why below), but untrusted and potentially malicious payloads will execute away from the user’s computer and your corporate network.</p><p>In summary, this solution:</p><ul><li><p>Keeps users alert to prevent credential theft and <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">account takeover</a></p></li><li><p>Automatically blocks dangerous downloads</p></li><li><p>Prevents malicious scripts from executing on the user’s device</p></li><li><p>Protects against zero-day exploits on the browser</p></li></ul>
    <div>
      <h2>How can I try it</h2>
      <a href="#how-can-i-try-it">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/products/zero-trust/email-security/">Area 1</a> is Cloudflare’s <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solution</a>. It protects organizations from the full range of email attack types (URLs, payloads, BEC), vectors (email, web, network), and attack channels (external, internal, trusted partners) by enforcing multiple layers of protection before, during, and after the email hits the inbox. Today it adds Email Link Isolation to the protections it offers.</p><p>If you are a Cloudflare Area 1 customer you can <a href="https://www.cloudflare.com/zero-trust/lp/email-link-isolation/">request access to the Email Link Isolation beta</a> today. We have had Email Link Isolation deployed to all Cloudflare employees for the last four weeks and are ready to start onboarding customers.</p><p>During the beta it will be available for free on <a href="https://www.cloudflare.com/plans/">all plans</a>. After the beta it will still be included at no extra cost with our <a href="https://www.cloudflare.com/press-releases/2020/announcing-area-1-phishguard/">PhishGuard plan</a>.</p>
    <div>
      <h2>Under the hood</h2>
      <a href="#under-the-hood">
        
      </a>
    </div>
    <p>To create Email Link Isolation we used a few ingredients that are quite special to Cloudflare. It may seem complicated and, in a sense, the protection is complex, but we designed this so that the user experience is fast, safe, and with clear options on how to proceed.</p>
    <div>
      <h3>1. Find potentially unsafe domains</h3>
      <a href="#1-find-potentially-unsafe-domains">
        
      </a>
    </div>
    <p>First, we have created a constantly updating list of domains that the <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">Cloudflare’s DNS resolver</a> recently saw for the first time, or that are somehow potentially unsafe (leveraging classifiers from the <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a> and other products). These are domains that would be too disruptive for the organization to block outright, but that should still be navigated with extra caution.</p><p>For example, people acquire domains and create new businesses every day. There’s nothing wrong with that - quite the opposite. However, attackers often set up or acquire websites serving legitimate content and, days or weeks later, send a link to intended targets. The emails flow through as benign and the attacker weaponizes the website when emails are already sitting on people’s inboxes. Blocking all emails with links to new websites would cause users to surely miss important communications, and delivering the emails while making links safe to click on is a much better suited approach.</p><p>There is also hosting infrastructure from large cloud providers, such as Microsoft or Google, that prevent crawling and scanning. These are used on our day-to-day business, but attackers may deploy malicious content there. You wouldn’t want to fully block emails with links to Microsoft SharePoint, for example, but it’s certainly safer to use Email Link Isolation on them if they link to outside your organization.</p><p>Attackers are constantly experimenting with new ways of looking legitimate to their targets, and that’s why relying on the early signals that Cloudflare sees makes such a big difference.</p>
    <div>
      <h3>2. Rewrite links in emails</h3>
      <a href="#2-rewrite-links-in-emails">
        
      </a>
    </div>
    <p>The second ingredient we want to highlight is that, as Cloudflare Area 1 processes and inspects emails for security concerns, it also checks the domain of every link against the suspicious list. If an email contains a link to a suspicious domain, Cloudflare Area 1 automatically changes it (<i>rewrites</i>) so that the interstitial page is shown, and the link opens with <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> by default.</p><p><i>Note: Rewriting email links is only possible when emails are processed inline, which is one of the options for deploying Area 1. One of the big disadvantages of any email security solution deployed as API-only is that closing this last mile gap through link rewriting isn’t a possibility.</i></p>
    <div>
      <h3>3. Opens remotely but feels local</h3>
      <a href="#3-opens-remotely-but-feels-local">
        
      </a>
    </div>
    <p>When a user clicks on one of these rewritten links, instead of directly accessing a potential threat, our systems will first check their current classification (benign, suspicious, malicious). Then, if it’s malicious, the user will be blocked from continuing to the website and see an interstitial page informing them why. No further action is required.</p><p>If the link is suspicious, the user is offered the option to open it in an isolated browser. What happens next? The link is opened with Cloudflare Browser Isolation in a nearby <a href="https://www.cloudflare.com/network/">Cloudflare data center</a> (globally within 50 milliseconds of 95% of the Internet-connect population). To ensure website compatibility and security, the target website is entirely executed in a sandboxed Chromium-based browser. Finally, the website is instantly streamed back to the user as vector instructions consumed by a lightweight HTML5-compatible remoting client in the user’s preferred web browser. These safety precautions happen with no perceivable latency to the end user.</p><p>Cloudflare Browser Isolation is an extremely secure remote browsing experience that feels just like local browsing. And delivering this is only possible by serving isolated browsers on a low latency, global network with our <a href="/cloudflare-and-remote-browser-isolation/">unique vector based streaming</a> technology. This architecture is different from legacy <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a> solutions that rely on fragile and insecure DOM-scrubbing, or are bandwidth intensive and high latency pixel pushing techniques hosted in a few high latency data centers.</p>
    <div>
      <h3>4. Reassess (always learning)</h3>
      <a href="#4-reassess-always-learning">
        
      </a>
    </div>
    <p>Last but not least, another ingredient that makes Email Link Isolation particularly effective is that behind the scenes our services are constantly reevaluating domains and updating their reputation in Cloudflare’s systems.</p><p>When a domain on our suspicious list is confirmed to be benign, all links to it can automatically start opening with the user’s local browser instead of with Cloudflare Browser Isolation.</p><p>Similarly, if a domain on the suspicious list is identified as malign, all links to that domain can be immediately blocked from opening. So, our services are constantly learning and acting accordingly.</p>
    <div>
      <h2>Email Link Isolation at Cloudflare</h2>
      <a href="#email-link-isolation-at-cloudflare">
        
      </a>
    </div>
    <p>It’s been four weeks since we deployed Email Link Isolation to all our 3,000+ Cloudflare employees, here’s what we saw:</p><ul><li><p>100,000 link rewrites per week on Spam and Malicious emails. Such emails were already blocked server side by Area 1 and users never see them. It’s still safer to rewrite these as they may be released from quarantine on user request.</p></li><li><p>2,500 link rewrites per week on Bulk emails. Mostly <a href="https://en.wikipedia.org/wiki/Graymail_(email)">graymail</a>, which are commercial/bulk communications the user opted into. They may end up in the users’ spam folder.</p></li><li><p>1,000 link rewrites per week on emails that do not fit any of the categories above — these are the ones that normally reach the user’s inboxes. These are almost certainly benign, but there’s still enough doubt to warrant a link rewrite.</p></li><li><p><b>25 clicks on rewritten links per week</b> (up to six per day).</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1J3g2dQOVL9ZKOnxr0YEiv/96056ff6d84319ebf7dfdd407409fb50/image2-64.png" />
            
            </figure><p>As a testament to the efficacy of Cloudflare Area 1, 25 suspicious link clicks per week for a universe of over 3,000 employees is a very low number. Thanks to Email Link Isolation, users were protected against exploits.</p>
    <div>
      <h2>Better together with Cloudflare Zero Trust</h2>
      <a href="#better-together-with-cloudflare-zero-trust">
        
      </a>
    </div>
    <p>In future iterations, administrators will be able to connect Cloudflare Area 1 to their Cloudflare Zero Trust account and apply isolation policies, <a href="/inline-dlp-ga/">DLP</a> (Data Loss Protection) controls and in-line <a href="/managing-clouds-cloudflare-casb/">CASB</a> (a <a href="https://www.cloudflare.com/learning/access-management/what-is-a-casb/">cloud access security broker</a>) to email link isolated traffic.</p><p>We are starting our beta today. If you’re interested in trying Email Link Isolation and start to feel safer with your email experience, you should sign up <a href="https://www.cloudflare.com/zero-trust/lp/email-link-isolation/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Email]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[SASE]]></category>
            <guid isPermaLink="false">5YA2XnoQIqTkOoF2QWarvE</guid>
            <dc:creator>João Sousa Botto</dc:creator>
            <dc:creator>Tim Obezuk</dc:creator>
            <dc:creator>Phil Syme</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing browser isolation for email links to stop modern phishing threats]]></title>
            <link>https://blog.cloudflare.com/email-link-isolation/</link>
            <pubDate>Mon, 20 Jun 2022 14:02:00 GMT</pubDate>
            <description><![CDATA[ As part of our exciting journey to integrate Area 1 into our broader Zero Trust suite, Cloudflare Gateway customers can soon enable Remote Browser Isolation for email links. With Email Link Isolation, gain an unmatched level of protection from sophisticated multi-channel email-based attacks ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YQ1f5ulfZD0daYx2dAfDk/2e897fb4a2f8b01f781b2fe0e37a31c8/image6-8.png" />
            
            </figure><p>There is an implicit and unearned trust we place in our email communications. This realization — that an organization can't truly have a Zero Trust security posture without including email — was the driving force behind <a href="/why-we-are-acquiring-area-1/">Cloudflare’s acquisition of Area 1 Security</a> earlier this year.  Today, we have taken our first step in this exciting journey of integrating Cloudflare Area 1 email security into our broader Cloudflare One platform. Cloudflare Secure Web Gateway customers can soon enable <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation (RBI)</a> for email links, giving them an unmatched level of protection from modern multi-channel email-based attacks.</p><p>Research from Cloudflare Area 1 found that nearly 10% of all observed malicious attacks involved credential harvesters, highlighting that victim identity is what threat actors usually seek. While commodity phishing attacks are blocked by existing security controls, modern attacks and payloads don’t have a set pattern that can reliably be matched with a block or quarantine rule. Additionally, with the growth of multi-channel phishing attacks, an effective <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security solution</a> needs the ability to detect blended campaigns spanning email and Web delivery, as well as deferred campaigns that are benign at delivery time, but weaponized at click time.</p><p>When enough “fuzzy” signals exist, isolating the destination to ensure end users are secure is the most effective solution. Now, with the integration of <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> into Cloudflare Area 1 email security, these attacks can now be easily detected and neutralized.</p>
    <div>
      <h3>Human error is human</h3>
      <a href="#human-error-is-human">
        
      </a>
    </div>
    <p>Why do humans <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7005690/">still click</a> on malicious links? It’s not because they haven’t attended enough training sessions or are not conscious about security. It’s because they have 50 unread emails in their inbox, have another Zoom meeting to get to, or are balancing a four-year old on their shoulders. They are trying their best. Anyone, <a href="https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers/">including security researchers</a>, can fall for socially engineered attacks if the adversary is well-prepared.</p><p>If we accept that human error is here to stay, developing security workflows introduces new questions and goals:</p><ul><li><p>How can we reduce, rather than eliminate, the likelihood of human error?</p></li><li><p>How can we reduce the impact of human error when, not if, it happens?</p></li><li><p>How can security be embedded into an employee’s existing daily workflows?</p></li></ul><p>It’s these questions that we had in mind when we reached the conclusion that email needs to be a fundamental part of any <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust platform</a>. Humans make mistakes in email just as regularly — in fact, sometimes more so — as they make mistakes surfing the Web.</p>
    <div>
      <h3>To block, or not to block?</h3>
      <a href="#to-block-or-not-to-block">
        
      </a>
    </div>
    <p>For IT teams, that is the question they wrestle with daily to balance risk mitigation with user productivity. The <a href="https://www.cloudflare.com/learning/security/glossary/what-is-a-security-operations-center-soc/">SOC</a> team wants IT to block everything risky or unknown, whereas the business unit wants IT to allow everything not explicitly bad. If IT decides to block risky or unknown links, and it results in a false positive, they waste time manually adding URLs to allow lists — and perhaps the attacker later pivots those URLs to malicious content anyway. If IT decides to allow risky or unknown sites, best case they waste time reimaging infected devices and resetting login credentials — but all too common, they triage the damage from a data breach or <a href="/targeted-ransomware-attack/">ransomware</a> lockdown. The operational simplicity of enabling RBI with email — also known as email link isolation — saves the IT, SOC, and business unit teams significant time.</p>
    <div>
      <h3>How it works</h3>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>For a Cloudflare Area 1 customer, the initial steps involve enabling RBI within your portal:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DB66MqCc1WgkzVLqbgB0q/27ac7d5a7619a8992949742e89ac50bb/image5-8.png" />
            
            </figure><p>With email link isolation in place, here’s the short-lived life of an email with suspicious links:</p><p><b>Step 1:</b> Cloudflare Area 1 inspects the email and determines that certain links in the messages are suspicious or on the margin</p><p><b>Step 2:</b> Suspicious URLs and hyperlinks in the email get rewritten to a custom Cloudflare Area 1 prefix URL.</p><p><b>Step 3:</b> The email is delivered to the intended inboxes.</p><p><b>Step 4:</b> If a user clicks the link in the email, Cloudflare redirects to a remote browser via <code>&lt;authdomain&gt;.cloudflareaccess.com/browser/{{url}}</code>.</p><p><b>Step 5:</b> Remote browser loads a website on a server on the Cloudflare Global Network and serves draw commands to the user's clientless browser endpoint**.**</p><p>By executing the browser code and controlling user interactions on a remote server rather than a user device, any and all malware and phishing attempts are isolated, and won't infect devices and compromise user identities. This improves both user and endpoint security when there are unknown risks and unmanaged devices, and allows users to access websites without having to connect to a VPN or having strict firewall policies.</p><p>Cloudflare’s RBI technology uses a unique patented technology called <a href="/cloudflare-and-remote-browser-isolation/">Network Vector Rendering (NVR)</a> that utilizes headless Chromium-based browsers in the cloud, transparently intercepts draw layer output, transmits the draw commands efficiency and securely over the web, and redraws them in the windows of local HTML5 browsers. Unlike legacy Browser Isolation technologies that relied on pixel pushing or DOM reconstruction, NVR is optimized for scalability, security and end user transparency, while ensuring the broadest compatibility with websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QDHEc1rlX53Z5kc2k0tob/dab1e12b7103cfca3623ac75965dc599/image1-11.png" />
            
            </figure>
    <div>
      <h3>A phishing attack before email link isolation</h3>
      <a href="#a-phishing-attack-before-email-link-isolation">
        
      </a>
    </div>
    <p>Let’s look at a specific example of a deferred phishing attack, how it slips past traditional defenses, and how email link isolation addresses the threat.</p><p>As organizations look to adopt new security principles and network architectures like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a>, adversaries continually come up with techniques to bypass these controls by exploiting the most used and most vulnerable application – email. Email is a good candidate for compromise because of its ubiquity and ability to be bypassed pretty easily by a motivated attacker.</p><p>Let’s take an example of a “deferred phishing attack”, without email link isolation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2c21s9A2FUgNs7mjZOInav/b99ae23100048308c28b534bc49a4dfb/image4-9.png" />
            
            </figure><p><b>Attacker preparation: weeks before launch</b>The attacker sets up infrastructure for the phishing attempt to come. This may include:</p><ul><li><p>Registering a domain</p></li><li><p>Encrypting it with SSL</p></li><li><p>Setting up proper email authentication (<a href="https://www.cloudflare.com/learning/dns/dns-records/dns-spf-record/">SPF</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dkim-record/">DKIM</a>, <a href="https://www.cloudflare.com/learning/dns/dns-records/dns-dmarc-record/">DMARC)</a></p></li><li><p>Creating a benign web page</p></li></ul><p>At this point, there is no evidence of an attack that can be picked up by secure email gateways, authentication-based solutions, or threat intelligence that relies solely on reputation-based signals and other deterministic detection techniques.</p><p><b>Attack “launch”: Sunday afternoon</b>The attacker sends an authentic-looking email from the newly-created domain. This email includes a link to the (still benign) webpage. There’s nothing in the email to block or flag it as suspicious. The email gets delivered to intended inboxes.</p><p><b>Attack launch: Sunday evening</b>Once the attacker is sure that all emails have reached their destination, they pivot the link to a malicious destination by changing the attacker-controlled webpage, perhaps by creating a fake login page to harvest credentials.</p><p><b>Attack landing: Monday morning</b>As employees scan their inboxes to begin their week, they see the email. Maybe not all of them click the link, but some of them do. Maybe not all of those that clicked enter their credentials, but a handful do. Without email link isolation, the attack is successful.</p><p>The consequences of the attack have also just begun – once user login credentials are obtained, attackers can <a href="https://www.crn.com/news/security/solarwinds-ceo-confirms-office-365-email-compromise-played-role-in-broad-based-attack">compromise legitimate accounts</a>, distribute malware to your organization’s network, steal confidential information, and cause much more downstream damage.</p>
    <div>
      <h3>A phishing attack after email link isolation</h3>
      <a href="#a-phishing-attack-after-email-link-isolation">
        
      </a>
    </div>
    <p>The integration between Cloudflare Area 1 and Cloudflare Browser Isolation provides a critical layer of post-delivery protection that can foil attacks like the deferred phishing example described above.</p><p>If the attacker prepares for and executes the attack as stated in the previous section, our email link isolation would analyze the email link at the time of click and perform a high-level assessment on whether the user should be able to navigate to it.</p><p><b>Safe link</b> - Users will be redirected to this site transparently</p><p><b>Malicious link</b> - Users are blocked from navigating</p><p><b>Suspicious link</b> - Users are heavily discouraged to navigating and are presented with a splash warning page encouraging them to view in the link in an isolated browser</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WinnctxUCvAnCPJsM45BE/45d9fda72b702eb51d0f39683b4b3408/image3-14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CAGmRXrUrW6Le2iX3yLjH/3a4889d9b6c627a9f4bd94a1a4c78361/image2-15.png" />
            
            </figure><p>While a splash warning page was the mitigation employed in the above example, email link isolation will also offer security administrators other customizable mitigation options as well, including putting the webpage in read-only mode, restricting the download and upload of files, and disabling keyboard input altogether within their Cloudflare Gateway consoles.</p><p>Email link isolation also fits into users’ existing workflows without impacting productivity or sapping their time with IT tickets. Because Cloudflare Browser Isolation is built and deployed on the Cloudflare network, with global locations in 270 cities, web browsing sessions are served as close to users as possible, minimizing latency. Additionally, Cloudflare Browser Isolation sends the final output of each webpage to a user instead of page scrubbing or sending a pixel stream, further reducing latency and not breaking browser-based applications such as SaaS.</p>
    <div>
      <h3>How do I get started?</h3>
      <a href="#how-do-i-get-started">
        
      </a>
    </div>
    <p>Existing Cloudflare Area 1 and Cloudflare Gateway customers are eligible for the beta release of email link isolation. To learn more and to express interest, <a href="http://www.cloudflare.com/zero-trust/lp/email-link-isolation">sign up for our upcoming beta</a>.</p><p>If you’d like to see what threats Cloudflare Area 1 detects on your live email traffic, request a free phishing risk assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>. It takes five minutes to get started and does not impact mail flow.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <guid isPermaLink="false">22Vv0Qr11T3jQcQy2q08TS</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Tarika Srinivasan</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to replace your email gateway with Cloudflare Area 1]]></title>
            <link>https://blog.cloudflare.com/replace-your-email-gateway-with-area-1/</link>
            <pubDate>Mon, 20 Jun 2022 13:14:55 GMT</pubDate>
            <description><![CDATA[ Traditional SEG architectures were built for the email environments of yesterday. Learn how to seamlessly transition to cloud-native, preemptive email security ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Leaders and practitioners responsible for <a href="https://www.cloudflare.com/zero-trust/products/email-security/">email security</a> are faced with a few truths every day. It’s likely true that their email is cloud-delivered and comes with some built-in protection that does an OK job of stopping spam and commodity malware. It’s likely true that they have spent considerable time, money, and staffing on their Secure Email Gateway (SEG) to stop phishing, malware, and other email-borne threats. Despite this, it’s also true that email continues to be the most frequent source of Internet threats, with Deloitte research finding that 91% of all cyber attacks begin with phishing.</p><p>If anti-phishing and SEG services have both been around for so long, why do so many phish still get through? If you’re sympathetic to <a href="https://en.wikipedia.org/wiki/Occam's_razor">Occam’s razor</a>, it’s because the SEG was not designed to protect the email environments of today, nor is it effective at reliably stopping today’s phishing attacks.</p><p>But if you need a stronger case than Occam delivers — then keep on reading.</p>
    <div>
      <h3>Why the world has moved past the SEG</h3>
      <a href="#why-the-world-has-moved-past-the-seg">
        
      </a>
    </div>
    <p>The most prominent change within the email market is also what makes a traditional SEG redundant – the move to cloud-native email services. More than 85% of organizations are expected to embrace a “cloud-first” strategy by 2025, <a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences">according to Gartner</a>®. Organizations that expect cloud-native scale, resiliency, and flexibility from their security controls are not going to get it from legacy devices such as SEGs.</p><p>When it comes to email specifically, <a href="https://www.gartner.com/document/4006566">Gartner® notes</a> that, “Advanced email security capabilities are increasingly being deployed as integrated cloud email security solutions rather than as a gateway” - with at least 40% of organizations using built-in protection capabilities from cloud email providers instead of a SEG, by 2023. Today, email comes from everywhere and goes everywhere – putting a SEG in front of your Exchange server is anachronistic; and putting a SEG in front of cloud inboxes in a mobile and remote-first world is intractable. <a href="https://www.cloudflare.com/learning/email-security/what-is-email-security/">Email security</a> today should follow your user, should be close to your inbox, and should “be everywhere”.</p><p>Apart from being architecturally out of time, a SEG also falls short at detecting advanced phishing and socially engineered attacks. This is because a SEG was originally designed to stop spam – a high-volume problem that needs large attack samples to detect and nullify. But today’s phishing attacks are more sniper than scattergun. They are low volume, highly targeted, and exploit our implicit trust in email communications to steal money and data. Detecting modern phishing attacks requires compute-intensive advanced email analysis and threat detection algorithms that a SEG cannot perform at scale.</p><p>Nowhere is a SEG’s outdated detection philosophy more laid bare than when admins are confronted with a mountain of email threat policies to create and tune. Unlike most other cyber attacks, email phishing and <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise (BEC)</a> have too many “fuzzy” signals and cannot solely be detected by deterministic if-then statements. Moreover, attackers don’t stand still while you create email threat policies – they adapt fast and modify techniques to bypass the rules you just created. Relying on SEG tuning to stop phishing is like playing a game of Whack-A-Mole rigged in the attacker’s favor.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SK0PsBM13jyobYcZF25fg/3d9efeb49a1df1a1d49c316692f283a8/image1-12.png" />
            
            </figure>
    <div>
      <h3>To stop phishing, look ahead</h3>
      <a href="#to-stop-phishing-look-ahead">
        
      </a>
    </div>
    <p>Traditional email security defenses rely on knowledge of yesterday’s active attack characteristics, such as reputation data and threat signatures, to detect the next attack, and therefore can’t reliably defend against modern phishing attacks that continually evolve.</p><p>What’s needed is forward-looking security technology that is aware not only of yesterday’s active phishing payloads, websites, and techniques — but also has insight into the threat actors’ next moves. Which sites and accounts are they compromising or establishing for use in tomorrow’s attacks? What payloads and techniques are they preparing to use in those attacks? Where are they prodding and probing before an attack?</p><p>Cloudflare Area 1 proactively scans the Internet for attacker infrastructure and phishing campaigns that are under construction. Area 1’s threat-focused web crawlers dynamically analyze suspicious web pages and payloads, and continuously update detection models as attacker tactics evolve – all to stop phishing attacks days before they reach the inbox.</p><p>When combined with the 1T+ daily DNS requests observed by <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Cloudflare Gateway</a>, this corpus of threat intelligence enables customers to stop phishing threats at the earliest stage of the attack cycle. In addition, the use of deep contextual analytics to understand message sentiment, tone, tenor and thread variations allows Area 1 to understand and distinguish between valid business process messages and sophisticated impersonation campaigns.</p><p>While we are big believers in layering security, the layers should not be redundant. A SEG duplicates a lot of capabilities that customers now get bundled in with their cloud email offering. Area 1 is built to enhance - not duplicate - native email security and stop phishing attacks that get past initial layers of defense.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wa98Zw9glRlVzhd2Ehdaz/0974a784a8561c9d49e2b519b89403f1/image4-10.png" />
            
            </figure>
    <div>
      <h3>Planning for your SEG replacement project</h3>
      <a href="#planning-for-your-seg-replacement-project">
        
      </a>
    </div>
    <p>The best way to get started with your SEG replacement project is deciding whether it’s a straight replacement or an eventual replacement that starts with augmentation. While Cloudflare Area 1 has plenty of customers that have replaced their SEG (more on that later), we have also seen scenarios where customers prefer to run Cloudflare Area 1 downstream of their SEG initially, assess the efficacy of both services, and then make a more final determination. We make the process straightforward either way!</p><p>As you start the project, it’s important to involve the right stakeholders. At a minimum, you should involve an IT admin to ensure email delivery and productivity isn’t impacted and a security admin to monitor detection efficacy. Other stakeholders might include your channel partner if that’s your preferred procurement process and someone from the privacy and compliance team to verify proper handling of data.</p><p>Next, you should decide your preferred Cloudflare Area 1 deployment architecture. Cloudflare Area 1 can be deployed as the MX record, over APIs, and can even run in multi-mode deployment. We recommend deploying Cloudflare Area 1 as the MX record for the most effective <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protection against external threats</a>, but the service fits into your world based on your business logic and specific needs.</p><p>The final piece of preparation involves mapping out your email flow. If you have multiple domains, identify where emails from each of your domains route to. Check your different routing layers (e.g. are there MTAs that relay inbound messages?). Having a good understanding of the logical and physical SMTP layers within the organization will ensure proper routing of messages. Discuss what email traffic Cloudflare Area 1 should scan (north/south, east/west, both) and where it fits with your existing email policies.</p>
    <div>
      <h3>Executing the transition plan</h3>
      <a href="#executing-the-transition-plan">
        
      </a>
    </div>
    <p><b>Step 1: Implement email protection</b>Here are the broad steps you should follow if Cloudflare Area 1 is configured as the MX record (time estimate: ~30 minutes):</p><ul><li><p>Configure the downstream service to accept mail from Cloudflare Area 1.</p></li><li><p>Ensure that Cloudflare Area 1’s egress IPs are not rate limited or blocked as this would affect delivery of messages.</p></li><li><p>If the email server is on-premises, update firewall rules to allow Cloudflare Area 1 to deliver to these systems.</p></li><li><p>Configure remediation rules (e.g. quarantine, add subject or message body prefix, etc.).</p></li><li><p>Test the message flow by injecting messages into Cloudflare Area 1 to confirm proper delivery. (our team can assist with this step.)</p></li><li><p>Update MX records to point to Cloudflare Area 1.</p></li></ul><p>Here are the steps if Cloudflare Area 1 is deployed downstream from an existing email security solution (time estimate: ~30 minutes):</p><ul><li><p>Configure the proper look back hops on Cloudflare Area 1, so that Cloudflare Area 1 can detect the original sender IP address.</p></li><li><p>If your email server is on-premises, update firewall rules to allow Cloudflare Area 1 to deliver to the email server.</p></li><li><p>Configure remediation rules (e.g. quarantine, add subject or message body prefix, etc.).</p></li><li><p>Test the message flow by injecting messages into Cloudflare Area 1 to confirm proper delivery. (our team can assist with this step.)</p></li><li><p>Update the delivery routes on your SEG to deliver all mail to Cloudflare Area 1, instead of the email servers.</p></li></ul><p><b>Step 2: Integrate DNS</b>One of the most common post-email steps customers follow is to integrate Cloudflare Area 1 with their DNS service. If you’re a Cloudflare Gateway customer, good news – Cloudflare Area 1 now uses Cloudflare Gateway as its <a href="https://www.cloudflare.com/learning/dns/what-is-recursive-dns/">recursive DNS</a> to protect end users from accessing phishing and malicious sites through email links or web browsing.</p><p><b>Step 3: Integrate with downstream security monitoring and remediation services</b>Cloudflare Area 1’s detailed and customizable reporting allows for at-a-glance visibility into threats. By integrating with SIEMs through our robust APIs, you can easily correlate Cloudflare Area 1 detections with events from network, endpoint and other security tools for simplified incident management.</p><p>While Cloudflare Area 1 provides built-in remediation and message retraction to allow customers to respond to threats directly within the Cloudflare Area 1 dashboard, many organizations also choose to integrate with orchestration tools for custom response playbooks. Many customers leverage our API hooks to integrate with SOAR services to manage response processes across their organization.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XVEtkicf9X4ySbz5UZyjE/9ac44ea6c8dc47c3bf6dd511dcd06a75/image2-16.png" />
            
            </figure>
    <div>
      <h3>Metrics to measure success</h3>
      <a href="#metrics-to-measure-success">
        
      </a>
    </div>
    <p>How will you know your SEG replacement project has been successful and had the desired impact? We recommend measuring metrics relevant to both detection efficacy and operational simplicity.</p><p>On the detection front, the obvious metric to measure is the number and nature of phishing attacks blocked before and after the project. Are you seeing new types of phishing attacks being blocked that you weren’t seeing before? Are you getting visibility into campaigns that hit multiple mailboxes? The other detection-based metric to keep in mind is the number of false positives.</p><p>On the operational front, it’s critical that email productivity isn’t impacted. A good proxy for this is measuring the number of IT tickets related to email delivery. The availability and uptime of the email security service is another key lever to keep an eye on.</p><p>Finally, and perhaps most importantly, measure how much time your security team is spending on email security. Hopefully it’s much less than before! A SEG is known to be a heavy-lift service deployment to ongoing maintenance. If Cloudflare Area 1 can free up your team’s time to work on other pressing security concerns, that’s as meaningful as stopping the phish themselves.</p>
    <div>
      <h3>You have lots of company</h3>
      <a href="#you-have-lots-of-company">
        
      </a>
    </div>
    <p>The reason we are articulating a SEG replacement plan here is because many of our customers have done it already and are happy with the outcomes.</p><p>For example, a Fortune 50 global insurance provider that serves 90 million customers in over 60 countries found their SEG to be insufficient in stopping phishing attacks. Specifically, it was an onerous process to search for “missed phish” once they got past the SEG and reached the inbox. They needed an <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security service</a> that could catch these phishing attacks and support a hybrid architecture with both cloud and on-premises mailboxes.</p><p>After deploying Cloudflare Area 1 downstream of their Microsoft 365 and SEG layers, our customer was protected against more than 14,000 phishing threats within the first month; none of those phishing messages reached a user’s inbox. A one-step integration with existing email infrastructure meant that maintenance and operational issues were next to none. Cloudflare Area 1’s automated message retraction and post-delivery protection also enabled the insurance provider to easily search and remediate any missed phish as well.</p><p>If you are interested in speaking with any of our customers that have augmented or replaced their SEG with Cloudflare Area 1, please reach out to your account team to learn more! If you’d like to see Cloudflare Area 1 in action, sign up for a Phishing Risk Assessment <a href="https://www.cloudflare.com/lp/emailsecurity/">here</a>.</p><p>Replacing a SEG is a great project to fit into your overall <a href="https://zerotrustroadmap.org/">Zero Trust roadmap</a>. For a full summary of Cloudflare One Week and what’s new, tune in to our <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3824611/the-evolution-of-cloudflare-one">recap webinar</a>.</p><p>-</p><p><sup>1</sup>Gartner Press Release, “<a href="https://www.gartner.com/en/newsroom/press-releases/2021-11-10-gartner-says-cloud-will-be-the-centerpiece-of-new-digital-experiences">Gartner Says Cloud Will Be the Centerpiece of New Digital Experiences</a>”, 11 November 2021</p><p><sup>2</sup>Gartner, “Market Guide for Email Security,” 7 October 2021, Mark Harris, Peter Firstbrook, Ravisha Chugh, Mario de BoerGARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">7yjswOAjVL3CSZoC2SxJI2</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
            <dc:creator>Tarika Srinivasan</dc:creator>
        </item>
        <item>
            <title><![CDATA[Area 1 Security Announces the Most Spoofed Brand of 2021: WHO is Back Again?]]></title>
            <link>https://blog.cloudflare.com/2022-march-hackness-who-phished-brand/</link>
            <pubDate>Thu, 31 Mar 2022 12:34:00 GMT</pubDate>
            <description><![CDATA[ From Jan. 2021 to Jan. 2022, more than 8.5 million (of 56 million in total) brand phishing emails blocked by Area 1 impersonated the World Health Organization ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2022 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p>Dear America’s sports-loving, company-securing fans: Before you find yourself glued this weekend to (what some call) <b>THE biggest game</b> in college basketball history, we are here to crown the 2022 March Hackness winner!</p><p>Also known as: the organization most impersonated by attackers in phishing campaigns in 2021.</p><p>Despite the shiny crop of newcomers to the Top 64 impersonated organizations (which included <b>Notion.so</b>, <b>Binance</b>, and grocery stores from <b>Costco</b> to <b>Kwik Shop</b>), our March Hackness “Final Four” ended up mirroring the 2022’s NCAA Men’s Final Four: with the <a href="https://www.usatoday.com/story/sports/ncaab/2022/03/27/kansas-bill-self-fourth-final-four-winners-losers-miami/7185222001/">blue blood</a> brands, that is.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1W1YsrZ38ES3VfT9k690du/b048e2d457f4fe0b20b7b072e04cb705/March-Hackness_Final_2-1.png" />
            
            </figure><p>That’s right, folks: on the heels of passing enduring the second year of the COVID-19 pandemic, the <b>World Health Organization</b> beat out <b>Amazon, Microsoft</b> and <b>T-Mobile</b> to become the back-to-back <b>winner of Area 1’s “ophishal” March Hackness title</b>!</p><p>From Jan. 2021 to Jan. 2022, a whopping <b>15% (over 8.5 million) of the 56 million brand phishing emails</b> blocked by Area 1 impersonated the WHO.</p><p>This timeframe (not coincidentally) matches the WHO remaining top of mind for global businesses closely monitoring the rollout of new vaccines and booster shots, as well as the rise of the Delta and Omicron variants.</p>
    <div>
      <h3>There’s Always Next Year’s Tournament…</h3>
      <a href="#theres-always-next-years-tournament">
        
      </a>
    </div>
    <p>The pandemic also influenced brand phishing in other ways. The “blue blood” of online retail and the cloud — and our March Hackness runner-up — <b>Amazon</b>, was impersonated in <b>over 3.2 million phishing</b> emails blocked by Area 1.</p><p>The focus of <a href="https://www.rd.com/article/amazon-email-scam/">Amazon scams</a> vary. However, as Area 1’s principal threat researcher, Juliette Cash, explains, common ones include phishing emails claiming that accounts have been ‘placed on hold,’ payments have been declined or that Prime memberships have ‘expired.’</p><p>These types of attacks utilize Amazon branding to impersonate official emails and entice victims to click links to update their credit card information. Once the link is clicked, the user’s browser will upload malicious content and direct them to verify their identity and input their payment details.</p><p>While these messages can be sent at any time, we’ve found that they are commonly tied to events, such as Amazon Prime Day, that trigger individuals to take action in fear of missing out.</p><p>By the way, although Amazon vs. the WHO isn’t exactly the epic and storied rivalry of Duke vs. UNC, Amazon has been in our list of top 64 most impersonated brands ever since March Hackness’ inception … so, we’ll count this matchup as an important piece of cybersecurity history!</p><p>Now, we have no idea what it’s like pretending to be a Blue Devil or Tar Heel (or Jayhawk or Wildcat) for a basketball season, but we do know some things about bad actors’ impersonation tactics.</p><p><b>Identity deception</b> using tactics like spoofing, domain impersonation and display name impersonation showcase the ease at which people can deceive the user through brand phishing to gain access to their goals.</p><p>In many cases, it’s as simple as a display name change. However, there are (of course) much more complex phishing techniques that will evade standard defenses.</p><p>For example, in <a href="https://www.area1security.com/blog/pfizer-vaccine-phishing-campaign/">this 2021 vaccine phishing campaign</a> (which originally bypassed Microsoft Office 365’s native defenses before it was blocked by Area 1), attackers pretending to be the CDC:</p><ul><li><p>Used Display Name Spoofing to fake the visible FROM header</p></li><li><p>Inserted an SMTP HELO command to spoof the Envelope From domain</p></li><li><p>Chose to spoof a domain that did not have email authentication protocols configured and that no longer resolved to an IP address</p></li><li><p>Compromised a legitimate host with a benign IP, and used it to launch their phishing attack</p></li></ul><p><i>That’s</i> what you call a playbook.</p><p>And speaking of <b>Microsoft</b>, it made our “Final Four” of most-phished brands for the fourth consecutive year.</p><p>Attackers not only frequently impersonate individual Microsoft tools, they also often use Microsoft’s own tools and branding to bypass legacy defenses and email authentication. (Just one example: this credential harvesting campaign specifically leveraged Microsoft SharePoint and Microsoft Planner).</p>
    <div>
      <h3>So, How Do <i>You</i> Guard Your Inbox?</h3>
      <a href="#so-how-do-you-guard-your-inbox">
        
      </a>
    </div>
    <p>The bottom line is this: Attackers know how to deliver brand phishing campaigns with techniques that evade native email defenses, email authentication and sender reputation tools (i.e., DMARC, SPF and DKIM).</p><p>But – they’re not particularly clever or unique about whom they impersonate. As you can see from our March Hackness findings, <b>just 25 organizations were used in the majority (57%) of these phishing emails.</b></p><p>There are three main reasons brand phishing continues to reach many organizations’ inboxes, year after year:</p><ul><li><p><b>It’s easy</b> for attackers to establish <a href="https://www.cloudflare.com/learning/ssl/what-is-domain-spoofing/">new phishing domains</a> that exploit trusted infrastructure.</p></li><li><p><b>It’s fast</b> for attackers to set up DMARC, SPF and DKIM policies for new phishing domains to reach inboxes.</p></li><li><p><b>People trust</b> emails from known organizations, business partners and internal employee accounts – accounts that they won’t identify as compromised unless they have more [advanced email security](more advanced email security in place) in place.</p></li></ul><p>You can learn more about what the common email authentication standards (SPF, DKIM and DMARC) can and cannot do when it comes to correctly verifying the origins of emails (and who they claim to be from), here.</p><p>But what does work better than email authentication for <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">preventing these kinds of phishing attacks</a>? <b>Advanced detection techniques.</b></p><p>For example, Area 1’s preemptive technology uses massive-scale web crawling to reveal emergent campaign infrastructure. Our small pattern analytics also identify phishing attack infrastructure, patterns of attack formation and threats within datasets that help us spot cyber campaigns as they’re being built.</p><p>To <b>see which brand phishing emails are landing in your organization’s inbox</b> (whether it’s from one of the March Hackness ‘players,’ or one of the 800-plus other brands hackers spoof), request a <b>free Phishing Risk Assessment</b> <a href="https://www.cloudflare.com/lp/emailsecurity/"><b>here</b></a><b>.</b></p><p>And, in the  meantime, we hope you all enjoy the last of 2022 March Madness. We know we at Area 1 will!</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Spoofing]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <guid isPermaLink="false">7zeIWQjLftRpiY3wTtnxk</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[2022 March Hackness: The Return of the Phishing Bracket - What 56 Million Emails Reveal about the Most Impersonated Brands]]></title>
            <link>https://blog.cloudflare.com/2022-march-hackness-phishing-bracket/</link>
            <pubDate>Sat, 26 Mar 2022 15:44:00 GMT</pubDate>
            <description><![CDATA[ Learn who made the list of the top brands that attackers use in phishing lures. This bracket is based on an analysis of more than 56 million phishing emails blocked by Area 1’s solution in the preceding 12 months since Feb 2022.  ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in March 2022 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p><i>Area 1 Security’s </i><b><i>Sixth Annual March Hackness: The Perfect Phishing Bracket</i></b><i> is here!</i></p><p><i>Learn who made the list of the top brands that attackers use in phishing lures. This bracket is based on an analysis of more than 56 million phishing emails blocked by Area 1’s solution in the preceding 12 months since Feb 2022. Like with the real tournament, there are some surprising Cinderella-like newcomers, well-known MVPs, and 800-plus spoofed organizations in between — but overall, 77% of all phishing attacks exploited just the Top 64 brands in our bracket, below.</i></p><p>Well, it’s that time of the year when NCAA basketball fans find themselves bemoaning broken brackets** and pondering life’s biggest questions, such as:</p><ul><li><p>How did the Wildcat men and women both lose in the first rounds?</p></li><li><p>Was Baylor’s exit scientific proof that all good things really must come to an end?</p></li><li><p>DID ALL THAT JUST REALLY HAPPEN?!</p></li><li><p>What if the referees didn’t [insert your adjectives of choice here]?</p></li></ul><p>**A heartbroken RIP to my unsuccessful pick-to-win-it-all, Gonzaga. Goodbye, Bulldogs, we barely knew you.</p><p>Now, the Area 1 Security folks can only offer some unscientific opinions to the questions above. After all, our job is to prevent breaches, not prognosticate about bad <a href="https://www.sbnation.com/college-basketball/2022/3/19/22986648/north-carolina-vs-baylor-march-madness-refs-video-brady-manek-ejection">perfectly fine</a> officiating.</p><p>Which means that, unlike the “sometimes it’s just luck” nature of college basketball in March, we prefer to look at cold, hard data to answer threat trend questions.</p><p>And that brings us to — DRUM ROLL PLEASE — the introduction of our <b>Sixth Annual March Hackness: The Perfect Phishing Bracket!</b></p><p>This is the time of year we conclusively answer: <b>Which organizations do attackers impersonate most in phishing campaigns?</b></p><p>For 2022, our analysis is based on <b>more than 56 million phishing emails</b> that we intercepted from January 2021 – January 2022. And although attackers pretended to be <b>over 800 different organizations</b>, ultimately, just <b>64 organizations were the go-to lures in a whopping 77%</b> of these brand phishing attempts:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3r90T4rUd0iN28GKqtttps/323e8c273a16e2747df5bc1267b81b7d/image1-25.png" />
            
            </figure>
    <div>
      <h3>Breaking Down the Bracket</h3>
      <a href="#breaking-down-the-bracket">
        
      </a>
    </div>
    <p>Now, we’ll reveal soon who was MOST impersonated, but let’s break down our Top 64 (and other initial findings from the overall data), below.</p><p>As always, attackers continued to take advantage of the following two, basic concepts when it comes to brand phishing campaigns (which, PS: easily evade DMARC and other email authentication standards):</p><p><b>1) Which technologies do people use most?</b>In Area 1’s first-ever March Hackness, we found hackers often exploited “traditional” banks and financial institutions, and loved to spoof the likes of AOL, Yahoo!, and Craigslist. But that was in 2016, when AOL’s AIM was still around (!!), before Facebook Marketplace launched as ‘the new’ Craigslist … and before something mysterious called Crypto.com rebranded the Staples Center.</p><p>Flash forward to today, and:</p><ul><li><p>In a sign of the times, and acknowledgement of how much <b>‘the Cloud’</b> is a part of all of our lives**, more than 22%** of brand phishing attacks exploited commonly <b>cloud services</b>, such as <b>Amazon, Box, DocuSign, Google, Intuit, Microsoft</b> and many others.</p></li><li><p>But, it isn’t just well-entrenched cloud companies on the list: <a href="https://www.theverge.com/2021/1/5/22215782/tiktok-notion-enterprise-software-teen-studyblr">viral-because-of-TikTok</a> <b>Notion.so,</b> the productivity tool that’s won over high schoolers and The Wall Street Journal, appeared for the first time in our Top 64!</p></li><li><p>Hackers are seeing dollar signs in cryptocurrency: <b>Binance</b> is a March Hackness newcomer (perhaps the Saint Peter’s of surprising suspect emails??!) this year. And although they didn’t crack the Top 64, <b>Coinbase</b>, <b>Metamask</b>, <b>Kraken</b>, <b>Gemini</b> and multiple crypto exchanges were also spoofed in thousands of phishing emails.</p></li><li><p>By the way, <b>Bitcoin</b>, which doesn’t technically qualify as an organization for our bracket, still deserves its own special shot-out: hackers referenced Bitcoin in <b>over 600,000</b> phishing emails last year. Actually, let’s just assume now that <a href="https://www.protocol.com/bulletins/circle-blockfi-pantera-hacked?">the crypto phishing trend</a> has only one direction to go.</p></li></ul><p><b>2) Which brands do people trust?</b>Attackers know users are more inclined to open and click messages from organizations that they interact with, whether it’s for information, work or play.</p><p>In addition to leveraging the <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">hybrid/remote workforce</a> trend to phish users using popular cloud services, attackers also pretended to be:</p><ul><li><p><b>Healthcare &amp; Social Services:</b> With the Covid pandemic lingering on yet another year, the <b>World Health Organization</b> (last year’s “ophishal champion”) and Humana both reappear in the top 64. Area 1 also blocked thousands of phishing emails pretending to be from organizations like <b>UNICEF</b> and the <b>Centers for Medicare &amp; Medicaid Services</b> … proving that hackers are more than willing to exploit society’s most vulnerable.</p></li><li><p><b>Grocery Stores/Food &amp; Beverage Retailers:</b> Like <a href="https://www.supermarketnews.com/online-retail/online-channel-builds-share-us-grocery-market-2021">70% of U.S. households</a> last year, my family did a LOT of online grocery shopping. In fact, over half of all shoppers (51%) <a href="https://progressivegrocer.com/new-digital-grocery-shopper">started online grocery shopping</a> after the pandemic began — and our data shows bad actors have also been happy to jump onto this bandwagon shopping cart. Area 1 intercepted millions of phishing emails spoofing grocers of all sizes, across all regions: from <b>Fred Meyer</b> to <b>Amazon Fresh</b>, to <b>Kwik Shop</b> to <b>Costco</b>, and many, many more.  [Insert bad pun about ordering ‘fish’, not ‘phish,’ here].</p></li></ul>
    <div>
      <h3>Who Will Cut Down the (Phishing) Nets?</h3>
      <a href="#who-will-cut-down-the-phishing-nets">
        
      </a>
    </div>
    <p>We’ll reveal the March Hackness champion — the No. 1 brand used for phishing (the organization used in a whopping <b>15% of the overall attacks</b>) — soon!</p><p>And, in the meantime, you might be wondering: “Why should I care? My organization has email authentication and other tools to block emails from fake senders!”</p><p>Well (unless you’re using Area 1), chances are good that brand phishing is still fouling up your organization’s inboxes.</p><p>Email authentication standards (i.e., SPF, DKIM and DMARC) can serve useful security functions such as validating server and tenant origins, protecting message integrity, and providing policy enforcement.</p><p>However, email authentication is <a href="https://gateway.on24.com/wcc/eh/2153307/lp/3955867/how-bad-actors-get-past-dmarc-in-60-minutes-or-less">largely ineffective</a> against brand phishing (especially when in the form of payload-less Business Email Compromise).</p><p>We’ll dive deeper into the reasons why, after we unveil the winner of the 2022 March Hackness: The Phishing Tournament. Stay tuned here.</p><p>PS: We can’t promise our findings will be less stressful than the NCAA championship game on April 4th. But, they should be more useful than wondering what “<a href="https://www.si.com/extra-mustard/2022/03/20/only-one-perfect-march-madness-bracket-remains">GO VOLS! GBO!</a>” is like in real life.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Spoofing]]></category>
            <guid isPermaLink="false">3FfQgyG9AErA8zhbOfAfse</guid>
            <dc:creator>Elaine Dzuba</dc:creator>
        </item>
        <item>
            <title><![CDATA[Tip of the ICEberg for Cloud-Native Email Security: Area 1 Named in the Gartner™ Market Guide for Email Security]]></title>
            <link>https://blog.cloudflare.com/2021-gartner-email-security-analysis/</link>
            <pubDate>Thu, 09 Dec 2021 15:53:00 GMT</pubDate>
            <description><![CDATA[ Gone are the days of the Secure Email Gateway (SEG) being an option. Cloud-native email protection with multiple deployment options are now changing the game. With winter in our minds, it’s time to start talking about “ICE.” ]]></description>
            <content:encoded><![CDATA[ <p><i>This blog originally appeared in December 2021 on the Area 1 Security website, and was issued in advance of Cloudflare's acquisition of Area 1 Security on April 1, 2022. </i><a href="/why-we-are-acquiring-area-1/"><i>Learn more</i></a><i>.</i></p><p><a href="https://www.cloudflare.com/zero-trust/products/email-security/">Email Security</a> has certainly come a long way. With cloud messaging now the standard versus the legacy on premise approach (Lotus Notes anyone?) the strategy of securing these clouds has also experienced a revolution. Gone are the days of the Secure Email Gateway (SEG) being an option. Cloud-native email protection with multiple deployment options are now changing the game. With winter in our minds, it’s time to start talking about “ICE.”</p><p>“ICES” (Integrated Cloud Email Security) solutions appeared for the first time in the recently-published Gartner <a href="https://www.cloudflare.com/lp/gartner-market-guide-email-security/">2021 Market Guide for Email Security</a> (ID G00735200).</p><p>In terms of the broader landscape, two trends carried over from the 2020 Market Guide:</p><ol><li><p>Cloud adoption continues to grow; and</p></li><li><p>Phishing, ransomware and account takeover attacks continue to increase.</p></li></ol><p>Gartner estimates that 70% of organizations now use cloud suites, primarily Microsoft 365 and Google Workspace. Even though these cloud email providers have provided built-in email hygiene and protection capabilities, email continues to be a significant attack vector, with phishing, ransomware and Business Email Compromise attacks resulting in large financial losses. Gartner cautions that, <b>“Continued increases in the volume and success of phishing attacks and migration to cloud email require a reevaluation of email security controls and processes. Security and risk management leaders must ensure that their existing solution remains appropriate for the changing landscape.”</b></p>
    <div>
      <h2>New Gartner Category Provides Better Security ChoICES</h2>
      <a href="#new-gartner-category-provides-better-security-choices">
        
      </a>
    </div>
    <p>In this year’s report, Gartner introduced a new category, Integrated Cloud Email Security (ICES), positioning it as the predominant defense against phishing threats slipping past traditional security controls. Although specific vendor capabilities vary, ICES can offer several advantages over traditional SEGs: advanced threat detection, ease of use, and improved visibility and response. Area 1 Security is pleased to be recognized as a Representative Vendor for this growing new category.</p>
    <div>
      <h3>Advanced Threat Detection</h3>
      <a href="#advanced-threat-detection">
        
      </a>
    </div>
    <p>One of the challenges of sophisticated phishing attacks is that there is often no link or attachment to scan for malware. Instead, attacks use social engineering to lure victims into sending money or sharing credentials. Other advanced attacks embed malicious links or weaponized documents behind layers of benign content, making detection difficult.</p><p>And as Gartner notes, “As built-in security from Microsoft and Google has improved, threat actors are also getting more sophisticated, often targeting them using fake login pages as a way of harvesting credentials.” And, “Many ransomware-as-a-service gangs use email as the initial entry point. Beyond malware, business email compromise and account takeover threats continue to rise, with significant financial losses as a result.”</p><p>Gartner explains that, “To combat these, [ICES] email security solutions use a variety of more-advanced detection techniques, including NLU, NLP, social graph analysis (patterns of email communication) and image recognition.”</p>
    <div>
      <h3>Ease of Use</h3>
      <a href="#ease-of-use">
        
      </a>
    </div>
    <p>With the majority of organizations using cloud email providers, ease of use and ease of integration are important when adding solutions for advanced threat detection. As an ICES solution, Area 1 Horizon™ can integrate with email providers via API, offering flexibility and faster time to value. (More on that flexibility part later.)</p><p>Gartner indicates that more customers will opt for API-based solutions in the future, predicting that the number of <a href="https://www.cloudflare.com/zero-trust/products/email-security/">anti-phishing solutions</a> delivered via API integration with the email platform will increase more than 4x by 2025.</p>
    <div>
      <h3>Improved Visibility and Response</h3>
      <a href="#improved-visibility-and-response">
        
      </a>
    </div>
    <p>Detection is only one piece of the puzzle; broad visibility and fast response are also necessary for an effective cybersecurity program.</p><p>Building on the advantages of APIs just mentioned, ICES solutions allow easy integration of email events into <a href="https://www.cloudflare.com/learning/security/what-is-siem/">security information and event management (SIEM)</a> or security orchestration, analytics and reporting (SOAR) systems via API. This allows for increased threat visibility and better coordinated response. Many ICES also offer built-in response capabilities or managed services offerings.</p>
    <div>
      <h2>Are SEGs on Thin Ice?</h2>
      <a href="#are-segs-on-thin-ice">
        
      </a>
    </div>
    <p>With all the advantages of ICES, it appears that traditional email security systems, many of which are still hardware-based/hosted hypervisors, are having a hard time keeping up. In our experience, many, if not most, of our customers have existing SEGs but come to us to eliminate the security gap left by <a href="https://www.cloudflare.com/static/576535737328a3d81de5dfe644af4b51/BDES-3794_CloudflareArea1_Report_TheStoryBehind140000MissedPhish_REVSEPT2022.pdf">SEGs missing threats</a>.</p><p>Gartner seems to agree, noting that “Initially, these solutions are deployed as a supplement to existing gateway solutions, but <b>increasingly the combination of the cloud email providers’ native capabilities and an ICES is replacing the traditional SEG.”</b></p><p>Gartner also predicts that nearly half (40%) of all organizations will switch to using built-in protection capabilities from cloud email providers and ICES rather than a SEG by 2023. This is an increase of nearly 150%.</p>
    <div>
      <h2>Area 1 Horizon Supports All Gartner Best PractICES</h2>
      <a href="#area-1-horizon-supports-all-gartner-best-practices">
        
      </a>
    </div>
    <p>We are pleased to be recognized in the Gartner first-time ever Integrated Cloud Email Security (ICES) category, and believe that we offer the most effective (and only preemptive) email security to defend organizations against advanced threats.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3wZtNqKWxkUVYpUgzpaIdL/882a41e292b21526310f3566e2f6a22d/image1-28.png" />
            
            </figure><p>As an ICES, Area 1 Horizon uses a variety of more-advanced detection techniques, including NLU, NLP, social graph analysis (patterns of email communication) and image recognition to preemptively detect and stop advanced threats.</p><p>However, unlike many other ICES vendors with API-only integration options, Area 1 can be deployed via API as well as inline as the MX record holder, simultaneously ensuring protection across the entire cycle: pre-delivery, at-delivery and post-delivery. With a focus on providing comprehensive security, our <a href="https://developers.cloudflare.com/email-security/deployment/">flexible deployment options</a> and direct integration make our solution easy to evaluate and prove business value.</p><p>For better visibility and faster response, the Area 1 Horizon platform also comes with built-in response with message retraction, and we easily integrate with SIEMs and SOARs for a cohesive extended detection and response (XDR) strategy.</p><p>As typical of their Market Guides, Gartner provides security practitioners with a short list of recommended vendor criteria.</p><p>We believe that Area 1 successfully maps to every single recommendation, as detailed below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LrYycNR5zXvThxX0y2rco/630dfa42f570f07f3f4d7028fa175033/image3-11.png" />
            
            </figure><p>In addition, Area 1 Security supports 16 out of the 19 key features Gartner calls out for all email security vendors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ch6XCi7mYo3oeNHuxO7aw/5bdcb47a0ae8bdeee4ae0dc33cfc99de/image2-19.png" />
            
            </figure><p>In short, Area 1 offers seamless, deep integration with cloud email providers like Microsoft 365 and Google Workspace for better security. And while many prefer to deploy us just with their email provider for a modern, cloud-first architecture, we also “play nICE” with SEGs, too.</p><p><b>To request a complimentary copy of the Gartner 2021 Market Guide for Email Security, click</b> <a href="https://www.cloudflare.com/lp/gartner-market-guide-email-security/"><b>here</b></a><b>.</b></p><p><b>To assess whether Area 1 Security can help address gaps in your current email security defenses, contact us for a free Phishing Risk Assessment,</b> <a href="https://www.cloudflare.com/lp/emailsecurity/"><b>here</b></a><b>.</b></p><p>Gartner, “Market Guide for Email Security,” Mark Harris, Peter Firstbrook, Ravisha Chugh, Mario de Boer, 7 October 2021.</p><p><b>Gartner Disclaimer:</b>Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</p> ]]></content:encoded>
            <category><![CDATA[Email Security]]></category>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">1VB3WGHm4OI7GTvUqGvR6V</guid>
            <dc:creator>Shalabh Mohan</dc:creator>
        </item>
    </channel>
</rss>