The DomainTools research team has uncovered a phishing campaign that actively exploits the Glitch platform to display short-lived phishing site URLs.
To bypass antivirus security, actors send emails with attachments to PDF documents that do not contain malicious code, but the PDFs contain a link that directs the user to a site hosted by Glitch.
Other sites where the hackers host similar documents include Heroku, SelCDN.
Glitch is a cloud hosting service that allows people to deploy apps and websites using Node.js, React and other development platforms. However, factors such as the favourable view Glitch enjoys from security platforms, short-lived URLs and the fact that threat actors could host them for free make Glitch an excellent target for abuse.
For more information, read the original story in Bleeping Computer.