Hackers abuse Cloudflare anti-bot checks to hide Microsoft 365 credential phishing pages


Cybercriminals are increasingly using trusted web security tools to make phishing pages harder to detect, and one reported Microsoft 365 credential theft campaign shows how that works in practice. According to reporting based on DomainTools research, the attackers used Cloudflare Turnstile checks, IP filtering, and user-agent screening to keep security scanners and automated crawlers away from the real phishing page long enough to steal credentials from real users.

The tactic matters because it flips a defensive tool into an evasion layer. Cloudflare Turnstile is designed to separate real visitors from bots, but in the hands of a phishing operator it can also block security analysis systems, URL scanners, and search crawlers. Cloudflare itself describes Turnstile as a verification tool that confirms visitors are real and blocks unwanted bots. That legitimate function is what makes the abuse effective.

This is not an isolated idea. Security researchers have documented similar campaigns before. Netskope reported that attackers used Cloudflare Turnstile to protect phishing pages from scanners, while Microsoft has separately warned that phishing kits targeting Microsoft 365 continue to evolve and operate at very large scale. Earlier this month, Microsoft detailed how Tycoon2FA became one of the most widespread phishing-as-a-service platforms, reaching more than 500,000 organizations each month worldwide.

How the campaign reportedly worked

The reported campaign used a staged filtering process before showing the fake Microsoft 365 login page. Based on the sample details you shared, the operators first placed a Cloudflare human-verification step in front of the phishing flow. They then checked the visitor’s IP address and browser user-agent, and served fake error pages or harmless redirects to visitors that looked like researchers, crawlers, or cloud-hosted scanners.

That approach fits a broader pattern seen in modern phishing. Attackers increasingly rely on anti-analysis gates, trusted cloud services, and multistage redirection to make phishing sites look more legitimate while shrinking the window in which defenders can inspect them. Microsoft has warned that phishing actors are exploiting complex infrastructure and misconfigurations to improve delivery and evade detection, while Cloudflare’s own 2026 threat report says phishing and credential abuse remain a major issue in modern identity attacks.

Why Microsoft 365 users should care

Microsoft 365 accounts remain high-value targets because they often unlock email, files, Teams chats, calendars, cloud storage, and internal business workflows. Once an attacker steals a password, the next step can be account takeover, business email compromise, data theft, or follow-on phishing from a trusted mailbox.

Microsoft says Defender for Office 365 includes anti-phishing protections such as impersonation protection, mailbox intelligence, and adjustable phishing thresholds. The company also says phishing kits and adversary-in-the-middle services continue to target Microsoft 365 at scale, especially when organizations rely on weaker authentication or do not use phishing-resistant controls.

What made this phishing campaign hard to spot

Evasion methodWhat it doesWhy it helps attackers
Cloudflare Turnstile checkFilters visitors before the phishing page loadsBlocks many automated scanners and crawlers
IP filteringScreens incoming IP addressesHides the real page from researchers and security vendors
User-agent checksDetects bots or analysis toolsServes fake 404 pages instead of the phishing content
Redirect logicSends suspicious visitors elsewhereReduces forensic evidence and live captures
Obfuscated scriptsHides credential theft logicMakes static analysis slower and less reliable

The most important point is not that Cloudflare built these tools for attackers. It did not. The problem is that legitimate security and traffic management services can be repurposed by criminals to protect phishing infrastructure from scrutiny. Similar abuse of trusted platforms has also shown up in campaigns involving cloud hosting, URL wrapping, and reverse-proxy phishing kits.

What defenders should do

  • Treat CAPTCHA or human-verification gates on unexpected login pages as a warning sign, not reassurance.
  • Enforce phishing-resistant MFA where possible.
  • Use Microsoft Defender for Office 365 anti-phishing policies and impersonation protection.
  • Inspect domains, redirects, and page behavior, not just page branding.
  • Look for multistage phishing flows that hide behind trusted infrastructure.
  • Train users to reach Microsoft 365 through known bookmarks or direct navigation instead of email links.

Signs a page may be a fake Microsoft 365 login

  • The login link arrives through an unexpected email or shared document lure.
  • A CAPTCHA or verification screen appears before a routine sign-in page.
  • The domain does not belong to Microsoft, even if the page looks familiar.
  • The page redirects several times before the sign-in form appears.
  • The site shows a fake error page when revisited from a different browser or network.

FAQ

What is Cloudflare Turnstile?

Cloudflare says Turnstile is a CAPTCHA replacement that confirms a visitor is real and blocks unwanted bots.

Did Cloudflare create a phishing tool?

No. The issue is that attackers can abuse legitimate anti-bot and traffic-filtering tools to shield phishing pages from automated analysis. Similar abuse has been documented in other phishing campaigns.

Why target Microsoft 365 credentials?

Microsoft 365 accounts can provide access to email, files, identity systems, and internal communication tools, making them valuable for account takeover and business email compromise. Microsoft has repeatedly warned that phishing operators actively target these accounts.

Can MFA stop this kind of attack?

MFA helps a lot, but not every form of MFA stops advanced phishing. Microsoft’s recent Tycoon2FA analysis showed that adversary-in-the-middle phishing services can bypass weaker MFA approaches by stealing session data in real time.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages