Cloudflare’s developer domains increasingly abused by threat actors
Cloudflare's 'pages.dev' and 'workers.dev' domains, used for deploying web pages and facilitating serverless computing, are being increasingly abused by cybercriminals for phishing and other malicious activities.
According to cybersecurity firm Fortra, the abuse of these domains has risen between 100% and 250% compared to 2023.
The researchers believe the use of these domains is aimed at improving the legitimacy and effectiveness of these malicious campaigns, taking advantage of Cloudflare's trusted branding, service reliability, low usage costs, and reverse proxying options that complicate detection.
Cloudflare Pages abuse
Cloudflare Pages is a platform designed for front-end developers to build, deploy, and host fast, scalable websites directly on Cloudflare's global Content Delivery Network (CDN).
It features static site hosting, supports a range of modern web app deployment frameworks, and offers SSL/TLS encryption by default, ensuring HTTPS connections without requiring additional configuration.
Fortra reports that Cloudflare Pages has become a tool for cybercriminals who abuse it by hosting intermediary phishing pages that redirect victims to malicious sites such as fake Microsoft Office365 login pages.

Victims are led there through links embedded in fraudulent PDFs or on phishing email bodies, which are not flagged by security products thanks to Cloudflare's reputation.
"Fortra's SEA team has observed a 198% increase in phishing attacks on Cloudflare Pages, rising from 460 incidents in 2023 to 1,370 incidents as of mid-October 2024," reports Fortra.
"With an average of approximately 137 incidents per month, the total volume of attacks is expected to surpass 1,600 by year-end, representing a projected year-over-year increase of 257%."

Fortra also notes that the threat actors use the "bccfoldering" tactic to hide the scale of their email distribution campaigns.
"Unlike the cc field, which displays the recipients, bccfoldering hides the recipients by adding them only to the email envelope, not the headers," explains Fortra.
"This makes the recipients undetectable unless the server is configured to reveal them. This tactic is used by the adversary to conceal the scale of the phishing campaign, as concealed recipients can make it difficult to detect how large the phishing campaign is."

Cloudflare Workers abuse
Cloudflare Workers is a serverless computing platform that allows developers to write and deploy lightweight applications and scripts directly on Cloudflare's edge network.
Their legitimate uses include API deployment, content optimization, custom firewall and CAPTCHA implementation, task automation, and the creation of microservices.
Fortra has seen a surge in the abuse of Workers, too, including for carrying out Distributed Denial of Service (DDoS) attacks, deploying phishing sites, injecting harmful scripts onto the target's browser, and brute-forcing account passwords.
In one case highlighted by the researchers, Cloudflare Workers is abused for hosting a human verification step in a phishing process to add legitimacy.

"We have witnessed a 104% surge in phishing attacks on this platform [Cloudflare Workers], climbing from 2,447 incidents in 2023 to 4,999 incidents year-to-date," reads the Fortra report.
"Currently averaging 499 incidents per month, the total volume is expected to reach almost 6,000 by year-end, reflecting a projected 145% increase compared to the previous year."

Users can defend against phishing that abuses legitimate services by verifying the authenticity of the URLs they're on when asked to enter sensitive information.
Finally, activating extra account security steps such as two-factor authentication can help prevent takeovers even when the credentials are compromised.
Police seize Matrix encrypted chat service after spying on criminals
Vodka maker Stoli files for bankruptcy in US after ransomware attack
CVE-2024-20439 Cisco Smart Licensing Utility Static Credential Vulnerability
CVE-2025-2783 Google Chromium Mojo Sandbox Escape Vulnerability
CVE-2019-9874 Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability
CVE-2019-9875 Sitecore CMS and Experience Platform (XP) Deserialization Vulnerability
CVE-2025-30154 reviewdog/action-setup GitHub Action Embedded Malicious Code Vulnerability
CVE-2025-1316 Edimax IC-7100 IP Camera OS Command Injection Vulnerability
CVE-2024-48248 NAKIVO Backup and Replication Absolute Path Traversal Vulnerability
CVE-2017-12637 SAP NetWeaver Directory Traversal Vulnerability
CVE-2025-24472 Fortinet FortiOS and FortiProxy Authentication Bypass Vulnerability
Free online web security scanner