Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

New malaria vaccine offers hope for mothers and babies in Africa

Inside Harvey: How a first-year legal associate built one of Silicon Valley’s hottest startups

PFAS alter gene expression before birds hatch

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Experts detect multi-tier redirect tactics used to steal Microsoft 365 login credentials
Identity

Experts detect multi-tier redirect tactics used to steal Microsoft 365 login credentials

userBy userJuly 31, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 31, 2025Ravi LakshmananPhishing/Threat Intelligence

Microsoft 365 qualification theft attempt

Cybersecurity researchers have revealed details of a new phishing campaign that hides malicious payloads by bypassing defenses by abuse of link wrapping services from Proofpoint and Intermedia.

“Link Lapping is designed by vendors such as Proofpoint to protect users by routing all clicked URLs through the scanning service, allowing them to block known malicious destinations when clicked,” the CloudFlare Email Security team said.

“This is effective against known threats, but if the link wrapped when clicked is not flagged by the scanner, the attack can still be successful.”

The activities observed over the past two months have once again shown how threat actors can find different ways to leverage legitimate functions and reliable tools to carry out malicious actions.

It is worth noting that link wrapping exploitation involves gaining unauthorized access to email accounts that already use the feature within your organization.[.]com/v2/url? u =).

Cybersecurity

Another important aspect is about what CloudFlare calls “multitiaridirect abuse,” where threat actors first use URL shortening services like Bitly to obscure malicious links, and then Proofpoint sends the abbreviated link to an email message via the measured account, obscuring the second time.

This behavior effectively creates a redirect chain. This causes the URL to go through two levels of obfuscation (Bitly and ProofPoint URL defense) before being victimized to a phishing page.

In the attacks observed by Web Infrastructure Company, phishing messages exaggerate voicemail notifications, urging recipients to click on the links to listen to them, and ultimately pointing them to a fake Microsoft 365 phishing page designed to capture qualifications.

Alternative Infection Chains employ the same technique in emails that notify users of expected documents received by Microsoft teams and trick them by clicking on hyperlinks trapped in Booby.

A third variation of these attacks claims that you can impersonate a team in email, have unread messages, and click the “Team Reply” button embedded in the message to redirect to the qualification harvest page.

“By covering malicious destinations with legal urldefense[.]Proof Point[.]com and url[.]Abuse of email protection URLs, trustworthy link wrapping services for these phishing campaigns significantly increases the chances of successful attacks,” said CloudFlare.

The development comes amid a surge in phishing attacks that weaponize scalable vector graphics (SVG) files to avoid traditional spam prevention and phishing protections and launch multi-stage malware infections.

Cybersecurity

“Unlike JPEG and PNG files, SVG files are written in XML and support JavaScript and HTML code,” said New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) last month. “These can contain scripts, hyperlinks, and interactive elements. They can be exploited by embedding malicious code into harmless SVG files.”

Phishing campaigns have also been observed to embed fake Zoom video conferencing links in emails. When clicked, it triggers the redirect chain to a fake page that mimics a realistic-looking interface, then provides a “Chapter Connection Timing” message, which is brought to the phishing page and encourages you to qualify.

“Unfortunately, instead of ‘rejoining’, victim qualifications and IP addresses, countries and regions are extracted via Telegram, a messaging app well known for its ‘security and encrypted communications’ and inevitably sent to threat actors,” Cofense said in a recent report.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCaffeine can help bacteria resist antibiotics, research finds
Next Article Secret Blizzard deploys malware to ISP-level AITM attacks against the Moscow embassy
user
  • Website

Related Posts

LockBit is back, but ransomware fragmentation reaches breaking point

November 14, 2025

Chinese hackers use Anthropic’s AI to launch automated cyber espionage operations

November 14, 2025

Patched Fortinet FortiWeb flaw exploited in attack to create administrator account

November 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

New malaria vaccine offers hope for mothers and babies in Africa

Inside Harvey: How a first-year legal associate built one of Silicon Valley’s hottest startups

PFAS alter gene expression before birds hatch

LockBit is back, but ransomware fragmentation reaches breaking point

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.