2026 Futuriom 50: Highlights →Explore

Executive Summary

In 2024, a sophisticated phishing-as-a-service (PhaaS) operation leveraged Google and Cloudflare infrastructure to host undetectable phishing sites for over three years. By employing advanced cloaking techniques and encrypted traffic, threat actors were able to evade detection by security platforms and browsers, targeting users globally and harvesting credentials at scale. The persistent campaign highlights the effectiveness of public cloud abuse for malicious operations and the operational difficulties organizations face in detecting and mitigating such well-cloaked threats.

This incident underscores a growing trend: cybercriminals turning to public cloud providers for reliable infrastructure and exploiting their reputation to bypass security controls. It also signals the adaptability of phishing campaigns and the need for enhanced monitoring and zero trust strategies in response to evolving attacker TTPs.

Why This Matters Now

The continued ability of threat actors to run persistent, stealthy phishing campaigns on reputable public cloud platforms poses a major risk for organizations. With attackers refining evasion tactics and leveraging large-scale, trusted infrastructure, enterprises must invest in improved detection, east-west security controls, and zero trust approaches to defend against increasingly sophisticated phishing threats.

Attack Path Analysis

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The campaign exploited weaknesses in encrypted traffic monitoring, east-west traffic security, and centralized visibility—areas covered by HIPAA, PCI DSS, and NIST frameworks.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Enforcing zero trust segmentation, strong egress controls, cloud-native firewalls, and threat detection would have contained attacker movement, flagged malicious egress and credential theft activities, and prevented data exfiltration across cloud boundaries.

Initial Compromise

Control: Cloud Firewall (ACF)

Mitigation: Block hosting and inbound access to malicious phishing content.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Restrict credential re-use and unauthorized access to privileged resources.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Detect or block suspicious internal pivots and workload-to-workload movement.

Command & Control

Control: Egress Security & Policy Enforcement

Mitigation: Prevent unauthorized egress connections to unapproved destinations.

Exfiltration

Control: Threat Detection & Anomaly Response

Mitigation: Flag, alert, and halt suspicious data exfiltration behaviors.

Impact (Mitigations)

Contain and remediate persistent infrastructure abuse.

Impact at a Glance

Affected Business Functions

  • Email Communications
  • Customer Support
  • Online Transactions
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $500,000

Data Exposure

Potential exposure of customer credentials and sensitive communications due to phishing attacks leveraging public cloud infrastructure.

Recommended Actions

  • Enforce Cloud Firewall and egress filtering to block hosting or dissemination of phishing content across all cloud segments.
  • Deploy Zero Trust Segmentation to restrict privilege escalation and lateral movement after initial compromise.
  • Implement east-west traffic security and workload microsegmentation to monitor and control inter-service communications.
  • Apply advanced anomaly detection and threat response to identify suspicious exfiltration activity in real time.
  • Centralize policy, visibility, and enforcement across multi-cloud deployments to rapidly detect and contain cloud-enabled phishing threats.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image