Attackers Wrap Phishing Links Through URL Scanning Services to Bypass Detection
4 Articles
4 Articles
A phishing campaign recently analyzed by Cloudflare has highlighted a particularly insidious method. Attackers have abused rewriting systems from recognized suppliers, such as Proofpoint and Intermedia, to mask their malicious intentions and bypass e-mail protection devices. This new article in the series "Anatomy" looks at [...] The post Anatomy of an attack: when security links become phishing vectors appeared first on IT SOCIAL.
Attackers wrap phishing links through URL scanning services to bypass detection
Attackers are exploiting the URL wrapping practices of email security services to conceal phishing links and lend credibility to their malicious campaigns. Email security services often rewrite email message URLs to route them through an intermediary domain for scanning. While redirecting links through URL scanning services may seem counterintuitive, attackers take advantage of the delay before these services begin detecting and blocking phishin…
Cybercriminals are currently using a sophisticated trick to carry out targeted phishing attacks. The method misuses Proofpoint's link-wrapping system and leads unsuspecting users to manipulated Microsoft-365 pages. Attack over well-known security platform Cloudflare has revealed a phishing campaign in a recent analysis that specifically exploits confidence in established security solutions. According to the report of the in-house security unit C…
Clouddflare has released a new analysis of its Threat-Intel team Cloudforce One. The report shows how attackers abuse the Proofpoint link-wrapping feature to redirect unnoticed to various phishing sites from Microsoft Office-365. Phishing was once again the most common cause of security violations and identity theft last year. This technique is particularly dangerous and effective, as victims are much more likely to [...] The article Phishing ca…
Coverage Details
Bias Distribution
- There is no tracked Bias information for the sources covering this story.
Factuality
To view factuality data please Upgrade to Premium