This document discusses how cybercriminals are increasingly using cloud services to conduct phishing attacks. It provides examples of phishing-as-a-service models that allow easy hosting of phishing sites in the cloud. Specific case studies are described where phishing sites used cloud services like Azure and Google Cloud Platform to appear more legitimate or spread malware. The document concludes that while cloud adoption benefits organizations, it has also attracted criminals who leverage the cloud's power and shared security model for financially motivated attacks.