Phishing: use of reverse tunnel services to avoid detection and shutdown increases

Martin Brinkmann
Jun 8, 2022
Updated • Jun 8, 2022

Security researchers at CloudSEK have noticed an increase in the use of reverse tunnel service and URL shorteners in phishing campaigns. Cyber criminals use services such as, Ngrok or LocalhostRun to evade detection and "launch untraceable phishing campaigns" according to the researchers.

cloudsek phishing
image credit: CloudSEK

Phishing campaigns may impersonate legitimate websites and services to steal user data such as passwords or credit card numbers. These may be hosted on registered domains, free web hosting services or hacked websites; all of these options have in common that takedowns are quick and easy, as it is usually enough to contact the hosting provider or registrar to do so. Most hosting providers offer direct contact options for abuse cases.

Hosting providers are required to cooperate with law enforcement and take down domains and webpages that are being used in phishing campaigns. Internet users may report phishing websites and pages to hosting providers as well.

URL shorteners, services that point one web address to another, have been used in the past in phishing campaigns. These services are used for legitimate purposes, such as turning long web addresses into shorter ones to better remember the addresses.

CloudSEK noticed an uptick in the use of URL shortening services and reverse tunnel services in phishing campaigns.

Reverse tunnel services are often used in local development environments, as they allow customers to access local computer systems on the Internet. Some Internet users use reverse tunnel services for other purposes, including the hosting of personal cloud services.

Cybercriminals use these services to host phishing pages on local machines. These local machines are under their control, either directly or through successful hacks. New redirect URLs can be generated on the fly, and it is easy enough to change the IP address of local machines to decrease the chance of attack  interruptions caused by the blocking of IP address and domain names, or the taking down of webpages.

The combination of URL shortening services and reverse tunnel services obfuscates attacks even more. Links are often live for 24 hours only before the threat actors move on; this makes the blocking of campaigns that use these techniques difficult.

Local computer with phishing content >> Reverse Tunnel Service >> URL Shortening Service >> Attacks

Reserve tunnel operators don't have the same level of accountability as hosting providers, according to CloudSEK. The company analyzed more than 500 sites that were "hosted and distributed using reverse tunnel services and URL shortening services Ngrok, LocalhostRun, Try CloudFlare,,, and

The entire process begins with the creation of phishing websites and pages. These look like identical copies of legitimate sites, often banking sites and other financial sites, but other types of sites are used as well. The threat actors may host these on their own machines or on hacked devices.

Once the phishing pages and infrastructure has been created and is in place, reverse tunnel services come into play. These provide the link between the local machines and the Internet. URL shortening services are used to further obfuscate the campaign and make detection even harder.

The URL shortening links are then distributed in campaigns, e.g., by email, SMS, messaging services, or other means. Victims who access these links load the locally hosted webpages via the reverse tunnelling service's URL.

Data that victims enter on the phishing websites is then captured and either used directly or sold on the black market. Attackers may clear out banking accounts, use credit cards for online purchases, including the registration of new domains and hosting, or sell information in bulk on the dark web.

Threat actors will refresh links regularly, often every 24 hours, to continue the attacks. Phishing templates are reused, as they are hosted on local machines and not on the Internet. All it takes is to create new random links using any of the listed services, or others, for use in new attacks. Links used in old attacks result in not found errors, as the local machines are no longer accessible through them.

While old pages and addresses may be blocked, for instance, when they are reported to security companies or the authorities, the phishing content can't usually be taken down as it is hosted on local machines.

Cloudflare, Localhost, and Ngrok reverse tunnel services have in common that they provide links to webpages hosted on local machines.

Cloudflare's Argo Tunnel service is free to use for Cloudflare users. It runs a process on the local machine or a server, that is creating outbound tunnels to the Cloudflare network. The Localhost and Ngrok reverse tunnel services offer a free base version and paid extended versions. Ngrok's free plan, for instance, supports the use of random domains.

The service uses a secure reverse tunnel to "expose local servers behind NATs and firewalls to the public Internet". A program is run on the local machine that establishes the link to the Internet.

All three services have in common that they are used by web developers and users alike to connect local machines to the Internet. Some may use reverse tunnel services to access personal cloud services from any location in the world, others to host websites or other services.


CloudSek recommends the following to mitigate phishing attacks that use reverse tunnel services:

  • Organizations need to raise awareness among customers about legitimate domains and URLs; this applies to all types of phishing campaigns, as all host the phishing websites on different domains. While these may be made to look like authentic domains, inspection will show that they are not.
  • Real-time scans may help identify phishing domains, especially if the scans look at more than just the domain name.
  • Awareness needs to be raised among customers about malicious URLs and the use in phishing campaigns.
  • Policies need to be implemented that "ensure reverse tunnel service providers" assist in the takedown of phishing sites.

The best form of protection against malicious attacks is education. Internet users should avoid clicking on links that point to high profile targets such as banking websites or online shopping portals. These sites may be accessed by typing the domain names manually or through the use of bookmarks on devices.

Now You: how often do you encounter phishing attacks?

Phishing: use of reverse tunnel services to avoid detection and shutdown increases
Article Name
Phishing: use of reverse tunnel services to avoid detection and shutdown increases
Security researchers at CloudSEK have noticed an increase in the use of reverse tunnel service and URL shorteners in phishing campaigns.
Ghacks Technology News

Previous Post: «
Next Post: «


  1. Roger DeLodger said on June 9, 2022 at 12:43 am

    Disposable email addresses have become a chore. Most websites have a detector that rejects them when you try to sign up. The alternative is to use a ‘burnable’ account to sign up all the rubbish. I am still linked to a lot of accounts via my previous ISP mail account, that I used for legitimate setup or transfer in the months before cancelling. Sadly account verification rules out continuing to use that one. Instead I have a dedicated account.

    The other tip is to always use the same false details so you know DOB, etc if the site probes to check details.

    1. Tom Hawack said on June 9, 2022 at 11:19 am

      @Roger DeLodger ,

      > Disposable email addresses have become a chore. Most websites have a detector that rejects them when you try to sign up.

      Maybe does this depend of the DEA service; some are known to propose temporary addresses which may be why some websites reject them. In my experience with the ‘AnonAddy’ DEA service I’ve never encountered a website’s refusal to accept any of its addresses. But should this happen that there is always the alias email address workaround (given the email service provides this feature of course), which creates an alias address hosted on the user’s very email service provider, always accepted by all websites.

      1. Roger DeLoger said on June 9, 2022 at 10:07 pm

        @Tom Hawack
        Getting technical, AnonAddy is an email alias service, not a disposable mail service. Stuff that arrives in a burnable email account is never on-forwarded to the main account. You only sign in if a subscription necessitates email verification and only need to act on the latest message but should delete the lot every time you sign in.

  2. Tom Hawack said on June 8, 2022 at 7:23 pm

    No SPAM, no phishing attacks as far as I’m concerned. I’m very touchy when it comes to providing personal information, I don’t frequent social networks, no smartphone (only a plain mobile). Disposable Emails and email aliases are a must. Of course a good defense arsenal, OS and browsers, but even with full power if you remain naive you remain vulnerable.

    I agree with the article : “The best form of protection against malicious attacks is education.” … and good sense.
    Don’t forget to check the page actually rendered by looking systematically at the urlbar, especially when landing via a url shortener (even if that urlbar may be spoofed, but that’s another topic). Above all : don’t think the Web is a nice place worth your confidence. It’s dangerous unless you remain constantly alert, except of course when you’re on a trusted website (I relax here for instance as if I were at home, I make myself comfortable, have a drink, lighten up my pipe). Dangerous but cottages exist here and there with nice people, so becoming cynical would be a bad alternative.

    Those of us who’ve been surfing up & down & over & out on the Web know all this. But how should I guess if no one tells me who you are, all. Please provide therefor and hereafter a complete summary of yourself, thanks.

  3. Tachy said on June 8, 2022 at 5:10 pm

    I get several a week now since Putin started ‘openly’ murdering people and threw the world into chaos. Before that it was once a month or less.

    Now I’m getting them through sms as well. (Make sure to disable “autodownload mms” if your using an android phone.)

    1. just an Ed said on June 8, 2022 at 6:49 pm

      ?? What agency do you work for?

      1. aluminium said on June 8, 2022 at 7:40 pm

        Probably the one on the opposite side as the one you work for.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.