Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Kleiner Perkins has a really good week

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

From the massive offer of meta to the massive assessment of humanity, does AI have ceilings?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Experts detect multi-tier redirect tactics used to steal Microsoft 365 login credentials
Identity

Experts detect multi-tier redirect tactics used to steal Microsoft 365 login credentials

userBy userJuly 31, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 31, 2025Ravi LakshmananPhishing/Threat Intelligence

Microsoft 365 qualification theft attempt

Cybersecurity researchers have revealed details of a new phishing campaign that hides malicious payloads by bypassing defenses by abuse of link wrapping services from Proofpoint and Intermedia.

“Link Lapping is designed by vendors such as Proofpoint to protect users by routing all clicked URLs through the scanning service, allowing them to block known malicious destinations when clicked,” the CloudFlare Email Security team said.

“This is effective against known threats, but if the link wrapped when clicked is not flagged by the scanner, the attack can still be successful.”

The activities observed over the past two months have once again shown how threat actors can find different ways to leverage legitimate functions and reliable tools to carry out malicious actions.

It is worth noting that link wrapping exploitation involves gaining unauthorized access to email accounts that already use the feature within your organization.[.]com/v2/url? u =).

Cybersecurity

Another important aspect is about what CloudFlare calls “multitiaridirect abuse,” where threat actors first use URL shortening services like Bitly to obscure malicious links, and then Proofpoint sends the abbreviated link to an email message via the measured account, obscuring the second time.

This behavior effectively creates a redirect chain. This causes the URL to go through two levels of obfuscation (Bitly and ProofPoint URL defense) before being victimized to a phishing page.

In the attacks observed by Web Infrastructure Company, phishing messages exaggerate voicemail notifications, urging recipients to click on the links to listen to them, and ultimately pointing them to a fake Microsoft 365 phishing page designed to capture qualifications.

Alternative Infection Chains employ the same technique in emails that notify users of expected documents received by Microsoft teams and trick them by clicking on hyperlinks trapped in Booby.

A third variation of these attacks claims that you can impersonate a team in email, have unread messages, and click the “Team Reply” button embedded in the message to redirect to the qualification harvest page.

“By covering malicious destinations with legal urldefense[.]Proof Point[.]com and url[.]Abuse of email protection URLs, trustworthy link wrapping services for these phishing campaigns significantly increases the chances of successful attacks,” said CloudFlare.

The development comes amid a surge in phishing attacks that weaponize scalable vector graphics (SVG) files to avoid traditional spam prevention and phishing protections and launch multi-stage malware infections.

Cybersecurity

“Unlike JPEG and PNG files, SVG files are written in XML and support JavaScript and HTML code,” said New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) last month. “These can contain scripts, hyperlinks, and interactive elements. They can be exploited by embedding malicious code into harmless SVG files.”

Phishing campaigns have also been observed to embed fake Zoom video conferencing links in emails. When clicked, it triggers the redirect chain to a fake page that mimics a realistic-looking interface, then provides a “Chapter Connection Timing” message, which is brought to the phishing page and encourages you to qualify.

“Unfortunately, instead of ‘rejoining’, victim qualifications and IP addresses, countries and regions are extracted via Telegram, a messaging app well known for its ‘security and encrypted communications’ and inevitably sent to threat actors,” Cofense said in a recent report.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCaffeine can help bacteria resist antibiotics, research finds
Next Article Secret Blizzard deploys malware to ISP-level AITM attacks against the Moscow embassy
user
  • Website

Related Posts

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

August 1, 2025

Cursor AI code editor fixed the flaw that allows attackers to execute commands via SlackMCP

August 1, 2025

Attacker violates Microsoft 365 account using fake OAuth app with Tycoon kit

August 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Kleiner Perkins has a really good week

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

From the massive offer of meta to the massive assessment of humanity, does AI have ceilings?

Tesla is partially liable in Florida’s Autopilot Trial, with ju apprentices awarding $200 million in damages

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.