- The WicKed Web Weekly
- Posts
- Bypassing the Cloud: Cloudflare's Firewall and DDoS Protections Compromised
Bypassing the Cloud: Cloudflare's Firewall and DDoS Protections Compromised
Cloudflare Bypass, Web3 Security Woes, Global Surge in Cyber Attacks
Good morning, Merry Christmas! Let's unwrap some news that's been more naughty than nice. Cybersecurity seems to be on the naughty list this year, and it's not just coal these breaches are leaving behind. From the dark alleys of Web3's security woes to the global rise in high-profile hacks, our digital world is echoing with the clatter of cyber threats louder than Santa's reindeer on a tin roof.
First up, we dive into the murky waters of Cloudflare, where flaws in its firewall and DDoS protections have opened a Pandora's box of cyber vulnerabilities. It's a tale of trust abused and defenses outsmarted, reminding us that even the mightiest can falter.
Next, we surf through the turbulent waves of Web3's cybersecurity (or the lack thereof). Itβs a world where blockchain's shining armor is tarnished by the rust of neglect and short-sightedness, leaving a trail of hacks and a heap of homework for tech gurus.
Finally, we zoom out to a broader perspective, witnessing a global surge in cyber attacks. Big names like Clorox, Boeing, and MGM are not just headlines but cautionary tales of digital distress, painting a picture of a world grappling with the shadows of cyber extortion.
So, grab your coffee and tighten your seatbelts. We're about to take a rollercoaster ride through the loops and drops of the digital security landscape! π’π»π

Bypassing the Cloud: Cloudflare's Firewall and DDoS Protections Compromised
Cloudflare's firewall and DDoS protection systems are under scrutiny following revelations that they can be bypassed using the company's own infrastructure. Researchers from Certitude have discovered vulnerabilities in cross-tenant security controls that could be exploited by attackers using their own Cloudflare accounts.
The primary issue arises from the use of shared Cloudflare certificates for Authenticated Origin Pulls, which are intended to ensure that requests to the origin server come from Cloudflare. However, this setup allows attackers to send malicious payloads through the platform, as connections originating from Cloudflare are generally allowed.
Attackers can exploit this by setting up a custom domain with Cloudflare, pointing the DNS A record to a victim's IP address, and then disabling protection features for that domain in their Cloudflare tenant. This approach enables them to tunnel attacks through the Cloudflare infrastructure, effectively bypassing the victim's protection mechanisms.
The second vulnerability involves the abuse of allowlisting Cloudflare IP addresses. This mechanism stops the origin server from receiving traffic from individual visitor IP addresses, limiting it to Cloudflare IP addresses. However, this can be used to transmit rogue inputs and target other users on the platform.
Cloudflare has acknowledged these findings and updated its documentation with new warnings. The company now advises using custom certificates for Authenticated Origin Pulls and considering additional security measures for origin servers. The 'Allowlist Cloudflare IP addresses' mechanism is recommended as a defense-in-depth strategy, not a sole protective measure.
These revelations come amid increasing concerns over cybersecurity, with adversaries leveraging complex methods like dynamically seeded domain generation algorithms (DGA) to avoid detection. The findings underscore the need for continuous vigilance and adaptation in cybersecurity strategies.

Web3's Cybersecurity Crisis: A Call for Serious Action
The Web3 landscape is facing a severe cybersecurity crisis. Despite the rapid growth and innovation in the crypto and blockchain space, companies are struggling to keep up with the cybersecurity demands necessary to protect their systems and users.
2023 saw a stark increase in cyber attacks within the crypto realm, with losses exceeding $700 million in just the third quarter. This alarming figure highlights the industry's vulnerability to hacks and scams, yet there's a lack of urgency in addressing these security lapses.
A significant factor in this crisis is the cutback in private capital investment in Web3, prompted by market instability. This has led companies to prioritize development over security, creating a gap in their defenses against cyber threats. Despite the foundational security features of blockchain technology, the broader ecosystem remains plagued with vulnerabilities.
The year 2022 witnessed a scramble to recruit security engineers, but the subsequent market downturn shifted priorities away from security. Many engineers hired during this period now lack the qualifications or experience to tackle new technological challenges, leaving companies exposed to heightened risks.
Audit firms in the industry have faced substantial layoffs, signaling a decreasing reliance on traditional security measures. As a result, community-driven solutions like Code4rena and Sherlock have emerged, offering temporary relief but lacking long-term reliability and quality assurance.
The situation demands a paradigm shift where companies not only develop their cybersecurity tools but also adopt a 360-degree approach to security. Regular security audits, awareness of the need for continuous follow-up, and adaptation to new technologies like zk proofs and liquid staking are crucial.
The industry must embrace a culture of proactive risk mitigation and consistent security practices, guided by groups like the Open Web Application Security Project. Only through such a comprehensive approach can Web3 hope to secure its infrastructure and build trust among users and investors alike.

The 2023 Surge in Cyber Attacks: A Global Crisis
2023 has witnessed a significant surge in large-scale cyber attacks, marking a stark contrast to the decline observed in 2022. According to Crowdstrike Holdings Inc., ransomware attacks on high-profile targets like corporations, banks, hospitals, and government agencies have increased by 51% through late November.
This upswing in cyber attacks has resulted in substantial financial losses. Chainalysis Inc. reports that ransom payments made to hackers have nearly doubled, totaling almost $500 million. Nikesh Arora, CEO of Palo Alto Networks Inc., highlights the increasing frequency and severity of these attacks, noting that cybercriminals are causing damage in much shorter timeframes.
Recent months have seen devastating attacks, including disruptions in Australian port operations, chaos in Las Vegas casinos, supply shortages at Clorox Co., and compromised Treasury market trades. Orange Cyberdefense reports a 33% increase in cyber extortion victims over last year, with the majority in the US, UK, and Canada, and growing numbers in India, the Pacific islands, and Africa.
The ease of launching attacks and the lucrative nature of ransomware have fueled this rise in cybercrime. High-profile targets face the dilemma of paying ransoms to recover data or prevent its release on the dark web. This, in turn, encourages more attacks.
Despite efforts to combat these threats, challenges persist. Law enforcement faces difficulties due to the international scope of these crimes and the transient nature of cyber extortion groups. Most of these groups have a lifespan of less than six months, complicating efforts to investigate and disrupt their activities.
In response to the 2021 Colonial Pipeline Co. attack, the US declared ransomware a national security priority. Measures include cutting off criminals' cryptocurrency resources and new SEC rules requiring companies to disclose cybersecurity incidents within four days.
However, the rapid evolution of cyber threats, combined with the shift to remote work, has created new vulnerabilities. Companies are now more exposed to swift exploitation of software flaws, especially in technologies needed for remote work.
As the industry grapples with this crisis, organizations are investing in backup infrastructure and cyber incident response training to negotiate with hackers or avoid payments. Yet, the average ransom payment is increasing, reaching $851,000 in the third quarter, as per Coveware's report.
This global crisis underscores the need for continuous vigilance and adaptation in cybersecurity strategies to combat the ever-evolving and increasingly sophisticated landscape of cyber threats.