Experts Uncover Multi-Layer Redirect Strategy for Stealing Microsoft 365 Credentials

Published:

spot_img

Unmasking a New Phishing Campaign Utilizing Link Wrapping Techniques

Cybersecurity experts have uncovered a sophisticated phishing campaign that employs link wrapping services from Proofpoint and Intermedia, creating new challenges for organizations trying to protect their digital assets. This technique uses legitimate services to obscure malicious content, allowing threat actors to bypass traditional security measures.

Link wrapping is a security measure designed to protect users by sending all clicked URLs through a scanning service. According to the Cloudflare Email Security team, this approach enables the detection and blocking of known malicious links at the moment a user clicks on them. However, this method is not infallible. If a wrapped link is not flagged by the scanner at click time, the attack can still succeed, leaving users vulnerable.

Recent Campaign Insights

In the past two months, researchers have observed a resurgence in this type of attack. Cybercriminals have managed to exploit the features of email services by maliciously redirecting unsuspecting victims to phishing pages that mimic Microsoft 365 login screens. The attackers gain unauthorized access to email accounts that utilize link wrapping features, leading to emails that automatically embed harmful URLs in a disguised format.

For instance, when an attacker compromises an email account, their malicious URL gets transformed into a wrapped link (e.g., urldefense.proofpoint[.]com/v2/url?u=). This enhances the chances of the link being trusted by the recipient, making it more likely that they will click it.

Multi-Tiered Redirect Abuse

Another troubling tactic noted by Cloudflare is known as "multi-tiered redirect abuse." In this scenario, cybercriminals first obfuscate their malicious links using URL shorteners like Bitly. When the shortened link is then sent from a Proofpoint-protected account, it undergoes a second layer of concealment. This creates a complex redirect chain that can easily slip through security filters, making it harder for recipients to recognize the danger.

Phishing Tactics in Action

The phishing emails often masquerade as legitimate notifications, such as voicemail alerts, urging the recipients to click on a link to listen to their messages. These links eventually lead to fraudulent pages designed to harvest sensitive credentials. Similarly, other variations of the phishing attempts involve emails claiming to notify users about documents shared in Microsoft Teams, cleverly tricking them into clicking harmful hyperlinks.

In yet another approach, attackers impersonate Teams notifications, stating that there are unread messages. The emails prompt users to click on a "Reply in Teams" button, which takes them straight to credential-harvesting sites.

The Rise of SVG-Based Phishing

In parallel with these link-wrapping abuses, there has been a noticeable increase in phishing campaigns leveraging Scalable Vector Graphics (SVG) files. Unlike traditional image formats like JPEG or PNG, SVG files are written in XML and can incorporate JavaScript and HTML code. This allows for the embedding of harmful scripts within seemingly harmless files, increasing the risk of multi-stage malware infections.

As highlighted by the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), SVGs can contain interactive elements and hyperlinks, which can be exploited to facilitate attacks that traditional anti-spam and anti-phishing protocols may miss.

Zoom Phishing Schemes

Moreover, phishing campaigns have also targeted Zoom users, embedding fake meeting links in emails. Upon clicking these links, victims often find themselves redirected in a chain of deceptive pages that ultimately end at a phishing site. After being presented with a "meeting connection timed out" message, unsuspecting users are directed to a page that requests their login credentials.

Crucially, the gathered information—including IP address, location, and other sensitive details—is subsequently exfiltrated via Telegram, famously known for its purported encryption and secure communication features.

Conclusion

As these methods become more advanced and prevalent, it is crucial for organizations and individuals alike to remain vigilant against such phishing attempts. Understanding the tactics exploited by cybercriminals aids in developing better defenses against these threats. While technology continuously evolves, so do the strategies employed by threat actors, making cybersecurity awareness more important than ever.

spot_img

Related articles

Recent articles

Intensified Investigation into ₹100-Crore GST Evasion; Central Tax Official Under Scrutiny

Investigation into GST Evasion in Uttar Pradesh Overview of Alleged Tax Fraud In Uttar Pradesh, enforcement agencies are intensifying their investigation into a significant case of...

OpenAI Introduces Ads in ChatGPT for Free and Go Plan Users in the U.S.

OpenAI Introduces Ads in ChatGPT: What You Need to Know On January 17, 2026, OpenAI announced an important shift in its service model, revealing plans...

Cyble Report: Rising AI-Driven Cyber Threats and Ransomware on the Rise

A Rapidly Evolving Cyber Threat Environment A rapidly evolving cyber threat environment—marked by automation, artificial intelligence, and persistent extortion—has fundamentally reshaped how cyberattacks unfold and...

Medford Man Sentenced for Cocaine Operation on Dark Web

Oregon Man Sentenced for Dark Web Cocaine Distribution Arrest and Investigation Details In a recent case that highlights ongoing issues related to drug trafficking via the...