Bastion Security

Cloud Infrastructure: The New Home for Sophisticated Phishing

Cloud Infrastructure has become a key component of how modern-day companies operate
Talk to an expert

Cloud Infrastructure has become a key component of how modern-day companies operate as it provides scalability, reliability, and collaboration. However, this also provides threat actors with the capabilities to carry out sophisticated large-scale phishing attacks by abusing Cloud platforms to host malicious content and phishing kits which has driven higher successful phishing rates. 

Over the recent months, there has been a continued sharp increase observed in the number of phishing pages being hosted on legitimate cloud infrastructure. This shows a significant shift in threat actor behavior and within the phishing ecosystem, which primarily used to rely upon disposable dynamically generated algorithm (DGA) domains and bulletproof hosting providers to facilitate phishing campaigns. Threat actors are exploiting human trust and spinning infrastructure up on trusted platforms such as Amazon Web Services (AWS), Microsoft Azure, Google Firebase and Cloudflare. 

The shift in threat actor infrastructure no longer relies on “Is this a legitimate domain” but is now behavioral based. Modern Phishing-as-a-Service (PhaaS) kits have lowered the barrier of entry for threat actors allowing for sophisticated large-scale campaigns to be launched with high success rates. As a result, a surge in Initial Access Broker (IAB) activity has occurred, in turn fueling Ransomware-as-a-Service (RaaS) groups and broadening the threat landscape. PhaaS kits such as Tycoon2FA, Sneaky2FA and EvilProxy are among the most active that have been observed in the wild. PhaaS kits hosted on cloud infrastructure include multiple layers of built-in mechanisms to evade detection such as being able to pass SPF, DKIM, DMARC and CompAuth checks, short-lived domains, reverse proxy capabilities, and anti-sandboxing techniques such as CAPTCHA, time-based checks and user agent filtering. 

Common Cloud Infrastructure Domains Abused

  • hxxps://pages[.]dev
  • hxxps://worker[.]dev
  • hxxps://blob[.]core[.]windows[.]net
  • hxxps://s3[.]amazonaws[.]com
  • hxxps://storage[.]googleapis[.]com
  • hxxps://storage[.]cloud[.]google[.]com
  • hxxps://firebaseapp[.]com
  • hxxps://railway[.]app

Mitigations for Cloud Infrastructure Phishing

  • Enforce Phishing Resistant MFA (Passkeys or FIDO2)
  • Enforce Strict Sign-In requirements (Managed/Compliant devices and Geo-location restrictions)
  • Enable Email Content Inspection on security appliances 
  • Security Awareness Training for all staff


Events

Latest events

Join Bastion experts for networking events, technical briefings, and hands-on workshops hosted throughout the year.
View all events
Cyber security news

Latest advisories

Stay ahead of emerging threats with our expert blog posts, research, and industry updates.
TimePictra (Microchip) – Stored Cross-Site Scripting (XSS) (CVE-2026-3010)
During a security engagement, Steve Nyan Lin discovered a stored XSS vulnerability in the TimePictra web application which was due to a lack of input filtering. This affects the neName parameter when creating new network elements.
TimePictra (Microchip) – Lack of Authentication (CVE-2026-2844)
During a security engagement, Steve Nyan Lin discovered a lack of authentication within numerous functionaliy within the TimePictra web application which allowed viewing of sensitive information and making changes to network elements.
Silverstripe - Cross-Site Scripting (XSS) Vulnerability
A Cross-Site Scripting (XSS) vulnerability has been identified in the administrator panel of Silverstripe CMS, specifically in the handling of the user input within the form messages module.