Introduction
Cybersecurity researchers are observing a significant shift in phishing operations, where threat actors are increasingly abusing legitimate cloud and content delivery network platforms to host phishing infrastructure. By leveraging trusted services from major providers, attackers are effectively evading traditional detection mechanisms and exploiting implicit trust within enterprise security architectures.
Background and Context
Historically, phishing campaigns relied on newly registered or suspicious domains that were relatively easy to flag through reputation-based controls. Today, attackers are abandoning this approach in favor of well-established cloud and CDN platforms operated by globally trusted technology companies. This evolution marks a strategic attempt to blend malicious activity into normal-looking network traffic.
Technical Details of the Abuse
Investigations have revealed multiple phishing kits hosted on reputable platforms, including Microsoft Azure Blob Storage, Google Cloud services, Google Sites, and AWS CloudFront. Notable examples include:
- The Tycoon phishing kit deployed via Azure Blob Storage endpoints.
- The Sneaky2FA phishing framework hosted on Google Firebase Cloud Storage, designed with selective targeting logic.
- EvilProxy phishing infrastructure leveraging Google Sites for credential harvesting.
By hosting phishing content on these platforms, attackers benefit from globally distributed infrastructure, encrypted traffic, and strong domain reputations that are rarely blocked by default.
Sophisticated Targeting Techniques
These campaigns demonstrate a high level of operational maturity. The Sneaky2FA variant, for instance, filters incoming traffic to focus exclusively on corporate email accounts, actively rejecting free email domains. Fake Microsoft 365 login portals validate credential formats consistent with enterprise authentication, dramatically increasing the success rate against high-value organizational targets.
Detection Challenges and Security Blind Spots
A critical weakness exploited by these campaigns is the widespread practice of whitelisting trusted cloud providers. While technically justified, this approach creates a substantial detection gap. Email gateways and perimeter security tools often allow traffic from these domains without deep inspection, enabling phishing content to pass through unnoticed.
Response and Mitigation Strategies
Security experts emphasize that organizations can no longer rely solely on domain reputation or signature-based detection. Effective defense requires layered controls, including behavioral analysis, network traffic inspection, and dynamic payload analysis. Sandbox-based threat intelligence platforms have proven effective at uncovering malicious behavior within minutes, significantly reducing mean time to detection and response.
Indicators of Compromise and Threat Hunting
Researchers have identified several indicators of compromise linked to these campaigns, such as suspicious domains used in conjunction with trusted cloud hosting. Security teams are encouraged to pivot from known indicators and hunt for phishing-classified content hosted on legitimate cloud endpoints, shifting focus from domain age to infrastructure abuse patterns.
Outlook
As phishing tactics continue to evolve, the abuse of trusted cloud and CDN infrastructure is likely to accelerate. Organizations must adapt by enhancing visibility into hosted content and user interaction behavior, rather than assuming that trusted platforms equate to trusted intent. Addressing this blind spot is essential to maintaining resilience against modern, cloud-enabled phishing threats.
References / Source Attribution
- Public cybersecurity research findings and industry threat intelligence reports
- Analysis from security researchers monitoring cloud-hosted phishing campaigns



