Threat actors are abusing the Cloudflare Tunnel tool for persistent access and data theft. The open-source tool Cloudflared allows attackers to maintain stealthy access to compromised systems without being detected. They can make changes on the fly and enable/disable functionality to avoid detection. Cloudflared does not store logs, making it difficult to track malicious activity. Organizations can potentially limit access to specific data centers to detect unauthorized use of Cloudflared. #Cloudflare #DataTheft #PersistentAccess #Cybersecurity #ThreatActors
https://www.securityweek.com/threat-actors-abuse-cloudflare-tunnel-for-persistent-access-data-theft/