Hackers Exploits Glitch Platform to Launch Phishing URLs

November 19, 2021

The DomainTools research team has uncovered a phishing campaign that actively exploits the Glitch platform to display short-lived phishing site URLs.

To bypass antivirus security, actors send emails with attachments to PDF documents that do not contain malicious code, but the PDFs contain a link that directs the user to a site hosted by Glitch.

A careful examination of these PDF links shows that they contain JavaScript, which is used to steal credentials to an email address after being forwarded via compromised WordPress pages. Further revelations show that Glitch is just one of several channels that the threat actors use to bypass detection and steal credentials.

Other sites where the hackers host similar documents include Heroku, SelCDN.

Glitch is a cloud hosting service that allows people to deploy apps and websites using Node.js, React and other development platforms. However, factors such as the favourable view Glitch enjoys from security platforms, short-lived URLs and the fact that threat actors could host them for free make Glitch an excellent target for abuse.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

December 29, 2025 A critical security flaw has been found in LangChain, one of the most widely used frameworks for more...

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn