Threat actors are exploiting Cloudflare’s free TryCloudflare tunneling service to quietly deploy AsyncRAT through phishing campaigns. By masking malicious infrastructure within legitimate cloud services, the attackers create a stealthy operation that evades conventional detection mechanisms.
Threat Analysis
The attack utilizes a "living-off-the-land" (LotL) approach, where legitimate tools and services are repurposed for malicious intent. The infection chain is designed to be stealthy, multi-staged, and highly deceptive.
The Infection Chain:
- Phishing Delivery: Victims receive a phishing email containing a link (often hosted on Dropbox) to a ZIP archive. These archives are typically named to resemble business documents.
- Deceptive Shortcut: The ZIP file contains an Internet Shortcut file (.url) that uses a double-extension trick (e.g., document.pdf.url).
- WebDAV Connection: When the shortcut is opened, it connects to a malicious WebDAV server hosted via a TryCloudflare tunnel (typically on a *.trycloudflare.com domain).
- Python Payload Execution: The malware downloads a legitimate, signed Python environment directly from python.org to avoid detection by antivirus software and runs a malicious Python script (ne.py) within this trusted environment.
- Malware Injection: The script injects the final AsyncRAT payload into the legitimate explorer.exe process.
- Persistence: The malware ensures it remains on the system by placing batch files (e.g., ahke.bat, olsm.bat) in the Windows Startup folder, re-triggering the infection upon every login.
Indicators of Compromise (IoCs)
· TryCloudflare WebDAV subdomains serving unexpected or executable content
· Phishing emails with double-extension files(e.g., .pdf.url) that lead to remote shortcut execution.
· Abnormal Python downloads from official sites followed by unusual script execution
· Unexpected startup entries for batch scripts like ahke.bat or olsm.bat
Why This Is Dangerous
Successful infection by AsyncRAT grants attackers full remote control over the compromised system, allowing them to:
- Exfiltrate sensitive data and credentials.
- Log keystrokes and capture screenshots.
- Deploy additional malware (e.g., ransomware).
- Use the compromised machine as a pivot point for lateral movement within the network.
Recommendation
- Educate users about phishing risks and double-extension disguises.
- Block or monitor Try Cloudflare and other dynamic cloud tunnelling domains at the network boundary.
- Enforce endpoint security with behavioural detection (e.g., monitoring process injection and unauthorized Python execution).
- Audit startup scripts and remove any suspicious entries.
- Revoke credentials and perform forensic analysis if suspicious WebDAV or RAT activity is observed.
Security Teams
- Do not rely solely on reputation-based filtering — incorporate behavioural and content inspection for web traffic.
- Monitor for anomalous outbound connections from endpoints to random subdomains under cloud services.
- Use endpoint detection and response (EDR) tools to alert on script execution and persistence mechanisms.






.png)
.png)