Gabagool Phishing Campaign Exploits Cloudflare R2 to Evade Security

A sophisticated phishing campaign named "Gabagool" has recently been discovered, specifically targeting corporate and government employees by leveraging Cloudflare’s R2 storage service to host malicious content. Uncovered by the TRAC Labs team, this campaign cleverly exploits Cloudflare’s trusted reputation to evade most security filters. The phishing attack typically begins with compromised mailboxes sending seemingly harmless emails to other employees. These emails often contain an image disguised as a document, which includes a malicious URL-shortened link.

Upon users clicking the link, they are redirected through several file-sharing platforms before ultimately landing on a Cloudflare R2 bucket page. The URL format of the final page clearly indicates its storage on Cloudflare’s infrastructure, making it appear legitimate and trustworthy. Gabagool employs highly sophisticated methods to detect and avoid bot activity, such as using webdriver checks, mouse movement detection, cookie tests, and rapid interaction detection. If the system suspects bot activity, the user is redirected to a legitimate domain. Otherwise, after a short delay, the phishing page is loaded, which utilizes AES encryption to protect the server address and collects user credentials.

These credentials are then stealthily sent to the attacker’s server, identified as o365.alnassers.net for harvesting. Notably, Gabagool possesses the capability to handle various multi-factor authentication (MFA) methods, including PhoneAppNotification, PhoneAppOTP, OneWaySMS, TwoWayVoiceMobile, and TwoWayVoiceOffice. This advanced capability potentially allows attackers to bypass MFA protections, posing a significant threat to organizations employing these security measures. To counter Gabagool attacks, security experts recommend monitoring for unusual connections to Cloudflare R2 buckets and watching for traffic to known malicious servers like o365.alnassers.net.

Additionally, security teams should review any network traffic data sent to suspicious servers and use public URLScan queries to identify potential threats. The Gabagool phishing campaign highlights an overarching trend in the increasing sophistication of phishing attacks utilizing trusted infrastructures to bypass security protocols. Organizations must remain vigilant and continuously adapt their security measures to protect against such advanced threats. With detailed technical analysis and practical recommendations, security teams can identify and mitigate these attacks. The primary takeaway is that the use of reputable services like Cloudflare’s R2 storage for hosting malicious content represents a significant challenge for cybersecurity defenses, requiring continuous, proactive monitoring and adaptive security strategies.

Explore more

Physical AI Transitions From Hype to Real-World Scaling

The silent evolution of mechanical systems into sentient-like partners is currently reshaping the global industrial floor as robots move beyond rigid programming toward fluid interaction. This shift defines physical AI, a discipline that fuses human-like reasoning with mechanical agility. While experimental pilots once dominated headlines, the focus has moved toward industrial application. Leading firms in warehousing and logistics are now

How Can We Reclaim Human Vitality in the Age of AI?

The relentless flicker of a high-definition screen often serves as the primary gateway to existence for the modern individual who spends more time navigating digital interfaces than breathing the crisp air of the unmediated world. In a landscape defined by hyper-connectivity, the average person currently dedicates upwards of 70 hours a week to staring into “the glass”—a term encompassing the

Trend Analysis: Generative AI Risk Calculus

The meteoric rise of generative artificial intelligence has effectively decoupled the speed of technological deployment from the traditional pace of institutional oversight, creating a precarious gap where innovation often outruns safety. This structural imbalance has forced a paradigm shift in how organizations evaluate the utility of Large Language Models (LLMs), moving away from simplistic productivity metrics toward a rigorous, mathematically

Is Avoiding AI the Greatest Risk to Modern Public Health?

The landscape of modern medicine is currently witnessing a profound ideological shift as public health officials grapple with the rapid integration of sophisticated algorithms into daily operations. While the potential for these tools to revolutionize disease surveillance and community outreach is immense, a pervasive atmosphere of skepticism continues to hinder comprehensive implementation across the sector. This environment of adoption with

Autonomous AI Research Agents – Review

The ability of a single researcher to execute months of high-level analytical labor in less than three hours for the cost of a modest lunch signifies the end of the traditional academic production cycle. This transformation is not merely a matter of incremental speed but a fundamental reordering of the professional research landscape. As seen in recent high-level demonstrations, such