A sophisticated cybercrime network known as Triad Nexus is continuing to evolve its operations, leveraging cloud services, front companies, and infrastructure obfuscation techniques to sustain large-scale fraud campaigns, according to new from Silent Push. Active since at least 2020, the group has been linked to more than $200 million in losses, primarily driven by cryptocurrency investment fraud schemes commonly referred to as “pig butchering.” These scams involve building trust with victims over time before persuading them to invest in fraudulent platforms.
Triad Nexus has been associated with organized crime networks in Asia and previously relied on the Funnull content delivery network to support its activities. After U.S. sanctions were imposed on Funnull in 2025, the group adapted quickly by shifting its infrastructure and distancing itself from the sanctioned entity.
Investigators that the network has reestablished its global operations by using infrastructure laundering tactics, including front companies, geo-fencing, and distributed hosting strategies. These measures have allowed the group to continue targeting victims while reducing visibility to enforcement agencies.
A key tactic involves exploiting legitimate cloud services from major providers such as Amazon, Cloudflare, Google, and Microsoft. By using compromised or fraudulently created accounts often obtained through “account mules” Triad Nexus is able to host malicious infrastructure that appears credible and performs at enterprise-grade levels. This approach gives fraudulent websites the speed, reliability, and trust signals typically associated with legitimate services, making them harder to detect even for experienced users.
To avoid detection following sanctions, the group has implemented geo-blocking measures, restricting access to malicious domains from U.S. IP addresses. At the same time, it has shifted its focus toward emerging markets, including Spanish-speaking regions, Vietnam, and Indonesia, using localized content to increase success rates. Triad Nexus has also diversified its infrastructure by routing traffic through more than 175 dynamically generated domains and continuing to rely on bulletproof hosting providers such as CTG Server Limited to maintain operational resilience.
The network is heavily involved in brand impersonation campaigns, creating highly convincing replicas of well-known organizations. Targets have included global luxury and retail brands such as Cartier, Chanel, eBay, and TripAdvisor, as well as major financial institutions including Bank of America, Goldman Sachs, and Wells Fargo. These phishing operations are often indistinguishable from legitimate websites, enabling attackers to steal credentials, financial data, and cryptocurrency assets at scale.
To further obscure its activities, Triad Nexus operates through a network of seemingly legitimate front entities, including Bole CDN, CDN1.ai, Yunray.ai, CDN5.com, and CTGCDN. These entities help mask malicious traffic and create layers of separation between the attackers and their infrastructure.
Security that Triad Nexus represents a new generation of cybercrime operations that combine advanced technical capabilities with business-like operational models. By blending into legitimate cloud ecosystems and continuously adapting to enforcement actions, the group remains a persistent and evolving threat to both individuals and enterprises worldwide As cybercriminals increasingly adopt similar tactics, experts emphasize the need for stronger detection mechanisms, improved cloud security controls, and greater awareness of sophisticated fraud schemes targeting global markets.
Recommended Cyber Technology News:
- IonQ Expands Quantum Partnership with University of Maryland
- Alpha Vision Brings AI-Driven Compliance Monitoring to Cannabis Industry
- Aura Launches Identity-First Enterprise Security Platform
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading





