Query Details
// Enhanced Cloudflare Phishing Email Detections // https://www.fortra.com/blog/cloudflare-pages-workers-domains-increasingly-abused-for-phishing // Fortra has observed a rising trend in legitimate service abuse, with a significant volume of attacks targeting Cloudflare Pages. Workers.dev is a domain used by Cloudflare Workers’ deployment services, while Pages.dev is used by Cloudflare’s Pages platform that facilitates the development of web pages and sites. Fortra’s SEA team has observed a 198% increase in phishing attacks on Cloudflare Pages, rising from 460 incidents in 2023 to 1,370 incidents as of mid-October 2024. With an average of approximately 137 incidents per month, the total volume of attacks is expected to surpass 1,600 by year-end, representing a projected year-over-year increase of 257%. // The below KQL is a second layer detection on top of existing MDO detection for abused Cloudflare pages.dev and workers.dev Domains. // Custom DefenderXDR Detection - Moved to deleted/junk // Detect Cloudflare pages.dev and workers.dev Domains Abused for Phishing let MaliciousDomainTable=externaldata(RawData:string) [h'https://raw.githubusercontent.com/romainmarcoux/malicious-domains/main/full-domains-aa.txt'] | parse RawData with MaliciousDomain:string; EmailUrlInfo | where Timestamp > ago(1h) | where UrlDomain endswith ".pages.dev" or UrlDomain endswith ".workers.dev" | join EmailEvents on NetworkMessageId | where EmailDirection == "Inbound" | where DeliveryAction != "Blocked" | join MaliciousDomainTable on $left.UrlDomain == $right.MaliciousDomain // MITRE ATTACK
This KQL query is designed to detect phishing emails that abuse Cloudflare's Pages and Workers domains. Here's a simplified breakdown of what the query does:
Data Source: It uses an external data source containing a list of known malicious domains.
Email Filtering: The query looks at email data from the past hour.
Domain Check: It specifically checks if the email URLs end with ".pages.dev" or ".workers.dev", which are domains associated with Cloudflare's services.
Email Events: It joins this information with email event data to filter for inbound emails that were not blocked by the email system.
Malicious Domain Match: The query then checks if these domains match any in the list of known malicious domains.
The purpose of this query is to provide an additional layer of detection for phishing attempts that exploit Cloudflare's services, complementing existing detection mechanisms.

Steven Lim
Released: December 10, 2024
Tables
Keywords
Operators