Query Details

Enhanced Cloudflare Phishing Email Detections

Query

// Enhanced Cloudflare Phishing Email Detections
// https://www.fortra.com/blog/cloudflare-pages-workers-domains-increasingly-abused-for-phishing
// Fortra has observed a rising trend in legitimate service abuse, with a significant volume of attacks targeting Cloudflare Pages. Workers.dev is a domain used by Cloudflare Workers’ deployment services, while Pages.dev is used by Cloudflare’s Pages platform that facilitates the development of web pages and sites. Fortra’s SEA team has observed a 198% increase in phishing attacks on Cloudflare Pages, rising from 460 incidents in 2023 to 1,370 incidents as of mid-October 2024. With an average of approximately 137 incidents per month, the total volume of attacks is expected to surpass 1,600 by year-end, representing a projected year-over-year increase of 257%.

// The below KQL is a second layer detection on top of existing MDO detection for abused Cloudflare pages.dev and workers.dev Domains.

// Custom DefenderXDR Detection - Moved to deleted/junk
// Detect Cloudflare pages.dev and workers.dev Domains Abused for Phishing

let MaliciousDomainTable=externaldata(RawData:string)
[h'https://raw.githubusercontent.com/romainmarcoux/malicious-domains/main/full-domains-aa.txt']
| parse RawData with MaliciousDomain:string;
EmailUrlInfo
| where Timestamp > ago(1h)
| where UrlDomain endswith ".pages.dev" or UrlDomain endswith ".workers.dev"
| join EmailEvents on NetworkMessageId
| where EmailDirection == "Inbound"
| where DeliveryAction != "Blocked"
| join MaliciousDomainTable on $left.UrlDomain == $right.MaliciousDomain

// MITRE ATTACK

Explanation

This KQL query is designed to detect phishing emails that abuse Cloudflare's Pages and Workers domains. Here's a simplified breakdown of what the query does:

  1. Data Source: It uses an external data source containing a list of known malicious domains.

  2. Email Filtering: The query looks at email data from the past hour.

  3. Domain Check: It specifically checks if the email URLs end with ".pages.dev" or ".workers.dev", which are domains associated with Cloudflare's services.

  4. Email Events: It joins this information with email event data to filter for inbound emails that were not blocked by the email system.

  5. Malicious Domain Match: The query then checks if these domains match any in the list of known malicious domains.

The purpose of this query is to provide an additional layer of detection for phishing attempts that exploit Cloudflare's services, complementing existing detection mechanisms.

Details

Steven Lim profile picture

Steven Lim

Released: December 10, 2024

Tables

EmailUrlInfoEmailEventsMaliciousDomainTable

Keywords

EmailUrlDomainPhishingDetectionCloudflarePagesWorkersDomainsMaliciousNetworkMessageIdInboundDeliveryActionBlockedMITREATTACK

Operators

letexternaldataparsewithwhereagoendswithorjoinon==!=

Actions