Executive Summary
In 2024, a sophisticated phishing-as-a-service (PhaaS) operation leveraged Google and Cloudflare infrastructure to host undetectable phishing sites for over three years. By employing advanced cloaking techniques and encrypted traffic, threat actors were able to evade detection by security platforms and browsers, targeting users globally and harvesting credentials at scale. The persistent campaign highlights the effectiveness of public cloud abuse for malicious operations and the operational difficulties organizations face in detecting and mitigating such well-cloaked threats.
This incident underscores a growing trend: cybercriminals turning to public cloud providers for reliable infrastructure and exploiting their reputation to bypass security controls. It also signals the adaptability of phishing campaigns and the need for enhanced monitoring and zero trust strategies in response to evolving attacker TTPs.
Why This Matters Now
The continued ability of threat actors to run persistent, stealthy phishing campaigns on reputable public cloud platforms poses a major risk for organizations. With attackers refining evasion tactics and leveraging large-scale, trusted infrastructure, enterprises must invest in improved detection, east-west security controls, and zero trust approaches to defend against increasingly sophisticated phishing threats.
Attack Path Analysis
The phishing-as-a-service operation gained initial access through cloud-hosted phishing campaigns leveraging cloaking and public infrastructure. Attackers likely escalated privileges by harvesting credentials and abusing application roles. They then moved laterally within the cloud environment, potentially pivoting to additional cloud or SaaS services. Command and control channels were established via encrypted or obfuscated egress from cloud workloads. Exfiltration occurred as harvested data and credentials were sent to attacker-controlled infrastructure. The impact included the facilitation of large-scale phishing campaigns, user compromise, and persistent abuse over an extended period.
Kill Chain Progression
Initial Compromise
Description
Use of cloud-hosted phishing kits and cloaked infrastructure to lure victims and harvest credentials.
MITRE ATT&CK® Techniques
Phishing: Spearphishing via Email
Exploit Public-Facing Application
Brute Force: Credential Stuffing
User Execution: Malicious Link
Proxy: Multi-hop Proxy
Stage Capabilities: Upload Malware
Adversary-in-the-Middle: Email Forwarding Rule
Application Layer Protocol: Web Protocols
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Strong Authentication for User Access
Control ID: 8.3.1
NYDFS 23 NYCRR 500 – Cybersecurity Program
Control ID: 500.02
DORA (Digital Operational Resilience Act) – ICT Risk Management Framework
Control ID: Art. 9 (1)
CISA ZTMM 2.0 – Credential Security and Phishing Resistance
Control ID: Identity Pillar – Authentication
NIS2 Directive – Cybersecurity Risk Management Measures
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
Phishing-as-a-Service operations targeting financial credentials pose severe risks, requiring enhanced egress security and threat detection capabilities to prevent data exfiltration.
Banking/Mortgage
Three-year cloaking campaign threatens banking infrastructure through sophisticated phishing attacks, necessitating zero trust segmentation and encrypted traffic monitoring for protection.
Health Care / Life Sciences
Healthcare organizations face critical exposure to global phishing enterprise, demanding multicloud visibility and anomaly detection to safeguard patient data compliance.
Computer Software/Engineering
Software companies vulnerable to phishing-as-a-service attacks exploiting cloud infrastructure, requiring Kubernetes security and inline IPS protection for development environments.
Sources
- Phishing Empire Runs Undetected on Google, Cloudflarehttps://www.darkreading.com/cloud-security/phishing-empire-undetected-google-cloudflareVerified
- Phishing actors exploit complex routing and misconfigurations to spoof domainshttps://www.microsoft.com/en-us/security/blog/2026/01/06/phishing-actors-exploit-complex-routing-and-misconfigurations-to-spoof-domains/Verified
- Caffeine Phishing-as-a-Service Platform | Fresh Phish Markethttps://cloud.google.com/blog/topics/threat-intelligence/caffeine-phishing-service-platformVerified
- New Cyberattack Campaign Uses Public Cloud Infrastructure to Spread RATshttps://thecyberpost.com/news/security/threat-intelligence/new-cyberattack-campaign-uses-public-cloud-infrastructure-to-spread-rats/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Enforcing zero trust segmentation, strong egress controls, cloud-native firewalls, and threat detection would have contained attacker movement, flagged malicious egress and credential theft activities, and prevented data exfiltration across cloud boundaries.
Control: Cloud Firewall (ACF)
Mitigation: Block hosting and inbound access to malicious phishing content.
Control: Zero Trust Segmentation
Mitigation: Restrict credential re-use and unauthorized access to privileged resources.
Control: East-West Traffic Security
Mitigation: Detect or block suspicious internal pivots and workload-to-workload movement.
Control: Egress Security & Policy Enforcement
Mitigation: Prevent unauthorized egress connections to unapproved destinations.
Control: Threat Detection & Anomaly Response
Mitigation: Flag, alert, and halt suspicious data exfiltration behaviors.
Contain and remediate persistent infrastructure abuse.
Impact at a Glance
Affected Business Functions
- Email Communications
- Customer Support
- Online Transactions
Estimated downtime: 3 days
Estimated loss: $500,000
Potential exposure of customer credentials and sensitive communications due to phishing attacks leveraging public cloud infrastructure.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Cloud Firewall and egress filtering to block hosting or dissemination of phishing content across all cloud segments.
- • Deploy Zero Trust Segmentation to restrict privilege escalation and lateral movement after initial compromise.
- • Implement east-west traffic security and workload microsegmentation to monitor and control inter-service communications.
- • Apply advanced anomaly detection and threat response to identify suspicious exfiltration activity in real time.
- • Centralize policy, visibility, and enforcement across multi-cloud deployments to rapidly detect and contain cloud-enabled phishing threats.



