See every side of every news story
Published loading...Updated

Attackers Wrap Phishing Links Through URL Scanning Services to Bypass Detection

Summary by CSO Online
Attackers are exploiting the URL wrapping practices of email security services to conceal phishing links and lend credibility to their malicious campaigns. Email security services often rewrite email message URLs to route them through an intermediary domain for scanning. While redirecting links through URL scanning services may seem counterintuitive, attackers take advantage of the delay before these services begin detecting and blocking phishin…
DisclaimerThis story is only covered by news sources that have yet to be evaluated by the independent media monitoring agencies we use to assess the quality and reliability of news outlets on our platform. Learn more here.

4 Articles

A phishing campaign recently analyzed by Cloudflare has highlighted a particularly insidious method. Attackers have abused rewriting systems from recognized suppliers, such as Proofpoint and Intermedia, to mask their malicious intentions and bypass e-mail protection devices. This new article in the series "Anatomy" looks at [...] The post Anatomy of an attack: when security links become phishing vectors appeared first on IT SOCIAL.

Cybercriminals are currently using a sophisticated trick to carry out targeted phishing attacks. The method misuses Proofpoint's link-wrapping system and leads unsuspecting users to manipulated Microsoft-365 pages. Attack over well-known security platform Cloudflare has revealed a phishing campaign in a recent analysis that specifically exploits confidence in established security solutions. According to the report of the in-house security unit C…

Clouddflare has released a new analysis of its Threat-Intel team Cloudforce One. The report shows how attackers abuse the Proofpoint link-wrapping feature to redirect unnoticed to various phishing sites from Microsoft Office-365. Phishing was once again the most common cause of security violations and identity theft last year. This technique is particularly dangerous and effective, as victims are much more likely to [...] The article Phishing ca…

Think freely.Subscribe and get full access to Ground NewsSubscriptions start at $9.99/yearSubscribe

Bias Distribution

  • There is no tracked Bias information for the sources covering this story.

Factuality 

To view factuality data please Upgrade to Premium

Ownership

To view ownership data please Upgrade to Vantage

Netzpalaver | #CloudComputing #Datacenter #Cybercrime #Telekommunkation #Infrastruktur broke the news in on Thursday, July 31, 2025.
Sources are mostly out of (0)

Similar News Topics