Hackers Leverage Safe Links and URL Rewriting to Evade Detection
#1
Information 
Quote:Threat actors were already abusing URL rewriting mechanisms in phishing campaigns to mask malicious domains.

URL rewriting is designed to protect users by replacing original links with security-vendor URLs that scan destinations at click time.

These rewritten links route traffic through the provider’s infrastructure so they can analyze the page in real time, block known malicious sites, and log user activity for administrators. In normal operation, this is a defensive layer that helps filter out obviously bad destinations.​

Threat actors, however, are turning this model on its head. By operating from compromised mailboxes that already use URL rewriting, they generate “pre-wrapped” safe links and then reuse those trusted-domain URLs in external phishing campaigns.

[Image: Fig01_examplephishlink.png?width=628&hei...shlink.png]Example of an original phishing link (Source : LevelBlue

SpiderLabs).The end result is a phishing link that visually and technically appears to belong to a reputable security or productivity provider, even though it eventually leads to a credential-harvesting site.

From late 2024 into 2025, LevelBlue SpiderLabs observed a sharp rise in multi-layered URL rewriting chains, where attackers nest multiple already‑rewritten links together.

Continue Reading...
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
NanaZip 6.0 Update 5 (6.0.1698.0)
NanaZip 6.0 Update ...harlan4096 — 06:29
7-Zip 26.01
7-Zip 26.01 Wha...harlan4096 — 06:26
Hasleo Backup Suite V5.8.2.0
Hasleo Backup Suite...harlan4096 — 06:25
Bitdefender 27.0.59.328
Latest version of ...harlan4096 — 06:24
AnyDesk 9.7.1 for Windows
Version 9.7.1 for ...harlan4096 — 06:23

[-]
Birthdays
Today's Birthdays
avatar (51)Toligo
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>