Hackers Exploit Email URL Rewriting to Insert Phishing Links
Cyber Security News ?
#1 World's Most Followed Cyber Security News Platform
Hackers have found a way to exploit email URL rewriting features, a tool initially designed to protect users from phishing threats. This new tactic has raised alarms among security experts, turning a protective measure into a vulnerability.
URL rewriting is a security feature employed by email security vendors to protect users from malicious links embedded in emails.
According to the Perception Point report, When a user clicks on a link, it is first redirected to the vendor's server, where it is scanned for?threats. If deemed safe, the user is redirected to the intended web content; access is blocked.
Types of URL Rewriting
There are two main paradigms for URL rewriting:
Organizations often combine these methods, employing tools like Secure Email Gateway (SEG) and Integrated Cloud Email Security (ICES) solutions for enhanced protection.
Since mid-June 2024, attackers have exploited URL rewriting features to insert phishing links. This manipulation takes advantage of the trust users place in known security brands, making even the most vigilant employees more likely to click on seemingly safe links.
Free Webinar on Detecting & Blocking Supply Chain Attack ->?Book your Spot
How Attackers Exploit URL Rewriting
Attackers typically have two options:
Download Free Cybersecurity Planning Checklist for SME Leaders (PDF) – Free Download
Real-World Examples of URL Rewriting Exploits
Security researchers from Perception Point have observed a surge in phishing attacks exploiting URL protection services. Here are some examples:
Example 1: Double Rewrite Attack
Two email security vendors, Proofpoint and INKY, were exploited in a sophisticated phishing attack. The attacker sent an email with a rewritten phishing link disguised as a legitimate SharePoint document notification.
领英推荐
The URL was rewritten twice, first by Proofpoint and then by INKY. After solving a CAPTCHA challenge, the user was redirected to a phishing site mimicking a Microsoft 365 login page.
Example 2: Exploiting Rewritten URLs Across Multiple Targets
In another attack, a rewritten URL generated through compromised accounts protected by INKY and Proofpoint targeted multiple organizations.
The attackers exploited the rewritten URL to extend their reach, turning a single point of compromise into a widespread phishing campaign.
Example 3: Mimecast’s URL Rewriting Exploit
Perception Point prevented a phishing attack leveraging Mimecast’s URL rewriting service. The phishing link appeared safe due to the Mimecast domain but redirected users to a phishing site designed to steal credentials.
Example 4: IRS Phishing Attack via Sophos URL Rewriting
In this attack, Sophos’s URL rewriting service disguised a malicious link. The phishing email appeared as an urgent verification request from a legitimate organization, and the rewritten URL added legitimacy, making it difficult for recipients to recognize the threat.
Perception Point offers Dynamic URL Analysis to combat these sophisticated attacks, which provides superior protection to traditional URL rewriting.
This approach actively browses new or unknown URLs and analyzes their behavior before the email is delivered.
Key Features of Dynamic URL Analysis
Hackers' exploitation of URL rewriting features underscores the need for continuous innovation in email security. As attackers become more sophisticated, security solutions must evolve to avoid these threats.
Organizations are urged to adopt advanced detection methods like Dynamic URL Analysis to protect against these evolving phishing tactics.
Technical Sales Expertised Engineering Professional
3 个月Yarra unga thevadiya team a, neenga thane da inda madiri poriki nainga pandra vela seivinga
Information Security Advisor | CRISC | ISO27001LA | AI Security & Governance | Security +| Azure (AZ900, SC900) | Onetrust TPRM | Expert Privacy Professional | GRC Expert | Network Security |Tech-Risk & Compliance
3 个月Thanks for sharing
At Centenary Bank
3 个月Well said!
Trade Finance | AR/AP | GL Reporting | Swift Messaging | Letters of Credit | Investment Banking
3 个月Insightful! Thanks for sharing
Cybersecurity & PR | Project Manager | OPWDD Support Broker
3 个月A brilliant article! This is yet another reminder that our defenses must constantly evolve to keep pace with the ever-adapting tactics of cybercriminals. Stay vigilant, everyone!