Hackers are utilizing hyperlink wrapping to steal your Microsoft 365 login
Cloudflare‘s e mail safety workforce just lately uncovered a brand new phishing approach. Attackers are utilizing compromised e mail accounts to disguise malicious hyperlinks through reputable hyperlink wrapping companies. Providers like these from Proofpoint or Intermedia rewrite incoming hyperlinks to reliable domains and scan them mechanically, a safety mechanism that, on this case, turns into a gateway.
The hyperlinks look deceptively real
The attackers shorten their hyperlinks utilizing URL shorteners and ship them through hacked accounts. The safety options present the hyperlinks with a “safe” area, which makes them seem reputable. However behind the URLs lurk phishing pages that deceptively mimic Microsoft 365 login pages. Topic strains equivalent to “New voicemail,” “Safe doc for retrieval,” or “New message in Microsoft Groups” are designed to lure unsuspecting customers. Some emails even pose as encrypted “Zix” messages, a widely known system for safe communication.
Clicking on seemingly innocent buttons like “Reply” leads on to faux login pages designed to steal credentials. In accordance with Cloudflare, attackers use the trustworthiness of the rewritten hyperlinks to bypass safety filters. Such strategies will not be new. Providers like Google Drive have already been equally abused, however the focused exploitation of hyperlink wrapping is a brand new chapter within the phishing playbook.
Cloudflare writes about this in its report:
Hyperlink wrapping is utilized by suppliers equivalent to Proofpoint to guard customers. This includes routing all clicked URLs by means of a scanning service in order that identified malicious targets will be blocked on the time of the clicking. […] This protection technique is kind of efficient towards identified threats. Nonetheless, assaults can nonetheless achieve success if the wrapped hyperlink has not but been flagged as harmful by the scanner on the time of click on.
Corporations must rethink safety
This can be a wake-up name for customers and organizations: computerized detection of malicious hyperlinks isn’t sufficient anymore. IT admins ought to replace firewalls and e mail filters, step up worker coaching, and require multi-factor authentication for Microsoft 365 accounts. These assaults spotlight how simply cybercriminals can flip protecting instruments into vulnerabilities.
This text initially appeared on our sister publication PC-WELT and was translated and localized from German.