Abusing Windows File Explorer and WebDAV for Malware Delivery
This analysis details how threat actors are exploiting Windows File Explorer's WebDAV functionality to deliver malware. WebDAV, a legacy protocol, is being used to trick users into downloading malicious files without going through web browsers, potentially bypassing security controls. Campaigns often use complex chains of scripts and legitimate files to deliver Remote Access Trojans (RATs). The tactic has been observed since February 2024, with increased activity from September 2024. Threat actors frequently abuse Cloudflare Tunnel demo accounts to host WebDAV servers. The report explains WebDAV links, how File Explorer can be manipulated, and various methods used by attackers, including URL shortcut files and LNK files. It also highlights the prevalence of German and English language campaigns targeting European corporate email accounts.
AI Analysis
Technical Summary
This threat involves the abuse of Windows File Explorer's support for the Web Distributed Authoring and Versioning (WebDAV) protocol, a legacy protocol that allows users to access files on remote servers as if they were local. Threat actors exploit this functionality by crafting WebDAV URLs that, when opened in File Explorer, initiate downloads of malicious payloads without using a web browser, thereby potentially bypassing browser-based security controls and filters. The attackers use complex chains of scripts and legitimate files to deliver Remote Access Trojans (RATs) such as Xworm, DCRat, and Async RAT. The delivery mechanism often includes URL shortcut (.url) files and Windows shortcut (.lnk) files that manipulate File Explorer to access malicious WebDAV servers hosted on Cloudflare Tunnel demo accounts, which are abused to avoid easy takedown and detection. The campaigns have been observed since February 2024, with a notable increase in activity from September 2024 onwards. The threat actors target European corporate email accounts, particularly those using German and English languages, indicating a regional focus. The attack chain leverages phishing emails containing malicious shortcuts that, when clicked, cause File Explorer to connect to the attacker-controlled WebDAV server and download malware payloads. This approach circumvents some endpoint protections that focus on browser-based downloads and exploits the trust in File Explorer's handling of WebDAV links. The campaign uses multiple MITRE ATT&CK techniques including T1202 (Indirect Command Execution), T1218 (Signed Binary Proxy Execution), T1059 (Command and Scripting Interpreter), T1204 (User Execution), T1547.001 (Registry Run Keys/Startup Folder), T1566 (Phishing), T1573.002 (Encrypted Channel), T1071.001 (Web Protocols), and T1105 (Ingress Tool Transfer). Indicators of compromise include numerous Cloudflare Tunnel domains and URLs used as WebDAV servers.
Potential Impact
The exploitation of Windows File Explorer's WebDAV functionality for malware delivery poses a significant risk to organizations worldwide, especially those with large Windows user bases. Successful exploitation can lead to the installation of Remote Access Trojans (RATs), enabling attackers to gain persistent remote access, steal sensitive data, conduct espionage, or move laterally within networks. Because the attack bypasses browser-based security controls, traditional web filtering and browser sandboxing solutions may be ineffective, increasing the likelihood of successful infection. The use of legitimate Windows features and signed binaries for execution complicates detection by endpoint security solutions. Organizations may face data breaches, operational disruption, and reputational damage. The focus on European corporate email accounts suggests targeted espionage or financially motivated attacks against businesses in this region. The abuse of Cloudflare Tunnel demo accounts also indicates attackers' attempts to evade takedown and attribution, prolonging campaign lifespan and increasing exposure.
Mitigation Recommendations
Organizations should implement multi-layered defenses specifically addressing this attack vector. First, educate users about the risks of opening unsolicited URL shortcut (.url) and LNK files received via email, emphasizing caution with unexpected attachments or links. Deploy endpoint detection and response (EDR) solutions capable of monitoring and alerting on suspicious use of WebDAV protocols and unusual File Explorer behaviors, including connections to uncommon WebDAV servers. Restrict or monitor outbound WebDAV traffic at the network perimeter and consider blocking or scrutinizing connections to known malicious Cloudflare Tunnel domains. Implement application control policies to restrict execution of scripts and binaries commonly abused in these attacks, such as Windows Script Host files (.wsh) and suspicious LNK files. Enhance email security by using advanced phishing detection and sandboxing to identify and block malicious attachments and links. Regularly audit and harden Windows registry run keys and startup folders to detect unauthorized persistence mechanisms. Finally, maintain up-to-date threat intelligence feeds to quickly identify and block indicators of compromise related to this campaign.
Affected Countries
Germany, United Kingdom, France, Netherlands, Belgium, Switzerland, Austria, United States
Indicators of Compromise
- url: http://everything-teach-pearl-eat.trycloudflare.com/DE
- url: http://frontier-shops-timothy-cal.trycloudflare.com/DE
- url: http://frontier-shops-timothy-cal.trycloudflare.com/documents/
- url: http://frontier-shops-timothy-cal.trycloudflare.com/rec.wsh
- domain: discounted-pressed-lc-vcr.trycloudflare.com
- domain: earl-dont-princess-bit.trycloudflare.com
- domain: everything-teach-pearl-eat.trycloudflare.com
- domain: frontier-shops-timothy-cal.trycloudflare.com
- domain: harbor-microwave-called-teams.trycloudflare.com
- domain: lose-croatia-acdbentity-lt.trycloudflare.com
- domain: module-brush-sort-factory.trycloudflare.com
- domain: nasdaq-aged-sf-cheers.trycloudflare.com
- domain: publicity-jenny-paintball-gilbert.trycloudflare.com
- domain: skills-statute-alberta-demand.trycloudflare.com
- domain: tiny-fixtures-glossary-advantage.trycloudflare.com
- domain: whats-menu-familiar-zshops.trycloudflare.com
Abusing Windows File Explorer and WebDAV for Malware Delivery
Description
This analysis details how threat actors are exploiting Windows File Explorer's WebDAV functionality to deliver malware. WebDAV, a legacy protocol, is being used to trick users into downloading malicious files without going through web browsers, potentially bypassing security controls. Campaigns often use complex chains of scripts and legitimate files to deliver Remote Access Trojans (RATs). The tactic has been observed since February 2024, with increased activity from September 2024. Threat actors frequently abuse Cloudflare Tunnel demo accounts to host WebDAV servers. The report explains WebDAV links, how File Explorer can be manipulated, and various methods used by attackers, including URL shortcut files and LNK files. It also highlights the prevalence of German and English language campaigns targeting European corporate email accounts.
AI-Powered Analysis
Technical Analysis
This threat involves the abuse of Windows File Explorer's support for the Web Distributed Authoring and Versioning (WebDAV) protocol, a legacy protocol that allows users to access files on remote servers as if they were local. Threat actors exploit this functionality by crafting WebDAV URLs that, when opened in File Explorer, initiate downloads of malicious payloads without using a web browser, thereby potentially bypassing browser-based security controls and filters. The attackers use complex chains of scripts and legitimate files to deliver Remote Access Trojans (RATs) such as Xworm, DCRat, and Async RAT. The delivery mechanism often includes URL shortcut (.url) files and Windows shortcut (.lnk) files that manipulate File Explorer to access malicious WebDAV servers hosted on Cloudflare Tunnel demo accounts, which are abused to avoid easy takedown and detection. The campaigns have been observed since February 2024, with a notable increase in activity from September 2024 onwards. The threat actors target European corporate email accounts, particularly those using German and English languages, indicating a regional focus. The attack chain leverages phishing emails containing malicious shortcuts that, when clicked, cause File Explorer to connect to the attacker-controlled WebDAV server and download malware payloads. This approach circumvents some endpoint protections that focus on browser-based downloads and exploits the trust in File Explorer's handling of WebDAV links. The campaign uses multiple MITRE ATT&CK techniques including T1202 (Indirect Command Execution), T1218 (Signed Binary Proxy Execution), T1059 (Command and Scripting Interpreter), T1204 (User Execution), T1547.001 (Registry Run Keys/Startup Folder), T1566 (Phishing), T1573.002 (Encrypted Channel), T1071.001 (Web Protocols), and T1105 (Ingress Tool Transfer). Indicators of compromise include numerous Cloudflare Tunnel domains and URLs used as WebDAV servers.
Potential Impact
The exploitation of Windows File Explorer's WebDAV functionality for malware delivery poses a significant risk to organizations worldwide, especially those with large Windows user bases. Successful exploitation can lead to the installation of Remote Access Trojans (RATs), enabling attackers to gain persistent remote access, steal sensitive data, conduct espionage, or move laterally within networks. Because the attack bypasses browser-based security controls, traditional web filtering and browser sandboxing solutions may be ineffective, increasing the likelihood of successful infection. The use of legitimate Windows features and signed binaries for execution complicates detection by endpoint security solutions. Organizations may face data breaches, operational disruption, and reputational damage. The focus on European corporate email accounts suggests targeted espionage or financially motivated attacks against businesses in this region. The abuse of Cloudflare Tunnel demo accounts also indicates attackers' attempts to evade takedown and attribution, prolonging campaign lifespan and increasing exposure.
Mitigation Recommendations
Organizations should implement multi-layered defenses specifically addressing this attack vector. First, educate users about the risks of opening unsolicited URL shortcut (.url) and LNK files received via email, emphasizing caution with unexpected attachments or links. Deploy endpoint detection and response (EDR) solutions capable of monitoring and alerting on suspicious use of WebDAV protocols and unusual File Explorer behaviors, including connections to uncommon WebDAV servers. Restrict or monitor outbound WebDAV traffic at the network perimeter and consider blocking or scrutinizing connections to known malicious Cloudflare Tunnel domains. Implement application control policies to restrict execution of scripts and binaries commonly abused in these attacks, such as Windows Script Host files (.wsh) and suspicious LNK files. Enhance email security by using advanced phishing detection and sandboxing to identify and block malicious attachments and links. Regularly audit and harden Windows registry run keys and startup folders to detect unauthorized persistence mechanisms. Finally, maintain up-to-date threat intelligence feeds to quickly identify and block indicators of compromise related to this campaign.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cofense.com/blog/abusing-windows-file-explorer-and-webdav-for-malware-delivery"]
- Adversary
- null
- Pulse Id
- 69a3ce1589019e16f3785b72
- Threat Score
- null
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://everything-teach-pearl-eat.trycloudflare.com/DE | — | |
urlhttp://frontier-shops-timothy-cal.trycloudflare.com/DE | — | |
urlhttp://frontier-shops-timothy-cal.trycloudflare.com/documents/ | — | |
urlhttp://frontier-shops-timothy-cal.trycloudflare.com/rec.wsh | — |
Domain
| Value | Description | Copy |
|---|---|---|
domaindiscounted-pressed-lc-vcr.trycloudflare.com | — | |
domainearl-dont-princess-bit.trycloudflare.com | — | |
domaineverything-teach-pearl-eat.trycloudflare.com | — | |
domainfrontier-shops-timothy-cal.trycloudflare.com | — | |
domainharbor-microwave-called-teams.trycloudflare.com | — | |
domainlose-croatia-acdbentity-lt.trycloudflare.com | — | |
domainmodule-brush-sort-factory.trycloudflare.com | — | |
domainnasdaq-aged-sf-cheers.trycloudflare.com | — | |
domainpublicity-jenny-paintball-gilbert.trycloudflare.com | — | |
domainskills-statute-alberta-demand.trycloudflare.com | — | |
domaintiny-fixtures-glossary-advantage.trycloudflare.com | — | |
domainwhats-menu-familiar-zshops.trycloudflare.com | — |
Threat ID: 69a57ab332ffcdb8a20f870b
Added to database: 3/2/2026, 11:55:31 AM
Last enriched: 3/2/2026, 12:11:05 PM
Last updated: 3/2/2026, 10:19:04 PM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Novel DPRK stager using Pastebin and text steganography
MediumMaltrail IOC for 2026-03-02
MediumFake Zoom meeting 'update' silently installs unauthorized version of monitoring tool abused by cybercriminals to spy on victims
MediumPlugX Meeting Invitation via MSBuild and GDATA
MediumThreatFox IOCs for 2026-03-01
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.