Tuesday, October 14, 2025

Attackers exploit link-wrapping companies to steal Microsoft 365 logins


A risk actor has been abusing hyperlink wrapping companies from reputed expertise corporations to masks malicious hyperlinks resulting in Microsoft 365 phishing pages that acquire login credentials.

The attacker exploited the URL safety characteristic from cybersecurity firm Proofpoint and cloud communications agency Intermedia in campaigns from June by means of July.

Some electronic mail safety companies embrace a hyperlink wrapping characteristic that rewrites the URLs within the message to a trusted area and passes them by means of a scanning server designed to dam malicious locations.

Legitimizing phishing URLs

Cloudflare’s E-mail Safety workforce found that the adversary legitimized the malicious URLs after compromising Proofpoint and Intermedia-protected electronic mail accounts, and certain used their unauthorized entry to distribute the “laundered” hyperlinks.

“Attackers abused Proofpoint hyperlink wrapping in quite a lot of methods, together with multi-tiered redirect abuse with URL shorteners by way of compromised accounts,” the researchers mentioned.

“The Intermedia hyperlink wrapping abuse we noticed additionally centered on gaining unauthorized entry to electronic mail accounts protected by hyperlink wrapping“ – Cloudflare E-mail Safety

The risk actor added an obfuscation layer by first shortening the malicious hyperlink earlier than sending it from a protected account, which routinely wrapped the hyperlink.

The researchers say that the attacker lured victims with faux notifications for voicemail or shared Microsoft Groups paperwork. On the finish of the redirect chain was a Microsoft Workplace 365 phishing web page that collected credentials.

Microsoft 365 phishing delivered by exploiting link-wrapping feature
Microsoft 365 phishing delivered by exploiting link-wrapping characteristic
supply: Cloudflare E-mail Safety

Within the marketing campaign that abused Intermedia’s service, the risk actor delivered emails pretending to be a “Zix” safe message notification for a viewing a safe doc, or impersonated a communication from Microsoft Groups informing of a newly acquired message.

The hyperlink allegedly resulting in the doc was a URL wrapped by Intermedia’s service and redirected to a faux web page from digital and electronic mail advertising and marketing platform Fixed Contact internet hosting the phishing web page.

Clicking on the reply button within the faux Groups notification led to a Microsoft phishing web page that may acquire login credentials.

By disguising the malicious locations with respectable electronic mail safety URLs, the risk actor elevated the probabilities of a profitable assault, the Cloudflare researchers mentioned.

It needs to be famous that abusing respectable companies to ship malicious payloads is just not new however exploiting the link-wrapping safety characteristic is a latest growth on the phishing scene.

Malware focusing on password shops surged 3X as attackers executed stealthy Excellent Heist situations, infiltrating and exploiting crucial programs.

Uncover the highest 10 MITRE ATT&CK methods behind 93% of assaults and find out how to defend in opposition to them.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com