<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cloudflare — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cloudflare/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cloudflare/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Protocol Tunneling via Cloudflared</title><link>https://feed.craftedsignal.io/briefs/2026-05-cloudflared-tunnel/</link><pubDate>Tue, 05 May 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cloudflared-tunnel/</guid><description>Adversaries may abuse Cloudflare Tunnel (cloudflared) on Windows systems to proxy command and control traffic or exfiltrate data through Cloudflare's edge, evading direct connection blocking.</description><content:encoded><![CDATA[<p>Cloudflare Tunnel (cloudflared) is a legitimate tool for exposing local services through Cloudflare&rsquo;s edge. This tool can be abused by adversaries to create quick or named tunnels for command and control, data exfiltration, or ingress tool transfer while evading direct connection blocking. The adversary may utilize quick tunnels (e.g. <code>tunnel --url http://127.0.0.1:80</code>) or named tunnels to proxy command and control traffic. This activity began to be tracked around March 2026. Defenders should be aware of suspicious execution of cloudflared, especially from unusual locations, to detect potential misuse of this tool for malicious purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker downloads the <code>cloudflared.exe</code> executable to the compromised system, potentially staging it in a temporary directory.</li>
<li>The attacker executes <code>cloudflared.exe</code> with the <code>tunnel</code> command and arguments such as <code>--url http://127.0.0.1:80</code> to create a quick tunnel, forwarding local traffic through Cloudflare&rsquo;s infrastructure.</li>
<li>The attacker configures a local service, such as a reverse proxy or command and control server, to listen on the specified localhost port (e.g., 80).</li>
<li>The attacker uses the Cloudflare tunnel to establish an encrypted connection to the local service, masking the origin of the traffic.</li>
<li>The attacker proxies command and control traffic through the Cloudflare tunnel, communicating with the compromised system without directly exposing its IP address.</li>
<li>Alternatively, the attacker exfiltrates sensitive data through the Cloudflare tunnel, routing it through Cloudflare&rsquo;s edge network.</li>
<li>The attacker maintains persistence by establishing scheduled tasks or autorun registry keys to ensure the Cloudflare tunnel is re-established upon system reboot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to proxy command and control traffic, exfiltrate data, or facilitate ingress tool transfer while evading direct connection blocking. This can lead to data breaches, system compromise, and prolonged unauthorized access. While the total number of victims is unknown, organizations using Windows systems are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for execution of <code>cloudflared.exe</code> with the <code>tunnel</code> argument to identify potential misuse of Cloudflare Tunnel (see rule: &ldquo;Potential Protocol Tunneling via Cloudflared&rdquo;).</li>
<li>Correlate network connection logs with process execution events to identify outbound connections to Cloudflare IPs or <code>trycloudflare.com</code>-style hostnames originating from <code>cloudflared.exe</code>.</li>
<li>Implement a process allowlist to restrict execution of <code>cloudflared.exe</code> to authorized locations (e.g., <code>C:\\Program Files\\Cloudflare\\</code>).</li>
<li>Monitor Windows Security Event Logs for suspicious logon or execution from the same context as <code>cloudflared.exe</code> processes.</li>
<li>Block the domain <code>trycloudflare.com</code> at the DNS resolver to prevent connections to attacker-controlled Cloudflare tunnels (see IOCs).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloudflare</category><category>tunneling</category><category>command and control</category><category>proxy</category></item></channel></rss>