New Blog Post | Widespread credential phishing campaign abuses open redirector links

%3CLINGO-SUB%20id%3D%22lingo-sub-2689406%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Widespread%20credential%20phishing%20campaign%20abuses%20open%20redirector%20links%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2689406%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Open-redirects-440x268.jpg%22%20style%3D%22width%3A%20649px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F306077i58B423A265131704%2Fimage-dimensions%2F649x395%3Fv%3Dv2%22%20width%3D%22649%22%20height%3D%22395%22%20role%3D%22button%22%20title%3D%22Open-redirects-440x268.jpg%22%20alt%3D%22Open-redirects-440x268.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F08%2F26%2Fwidespread-credential-phishing-campaign-abuses-open-redirector-links%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EWidespread%20credential%20phishing%20campaign%20abuses%20open%20redirector%20links%20%7C%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%20class%3D%22x-hidden-focus%22%3EMicrosoft%20has%20been%20actively%20tracking%20a%20widespread%20credential%20phishing%20campaign%20using%20open%20redirector%20links.%20Attackers%20combine%20these%20links%20with%20social%20engineering%20baits%20that%20impersonate%20well-known%20productivity%20tools%20and%20services%20to%20lure%20users%20into%20clicking.%20Doing%20so%20leads%20to%20a%20series%20of%20redirections%E2%80%94%3CWBR%20%2F%3Eincluding%20a%20CAPTCHA%20verification%20page%20that%20adds%20a%20sense%20of%20legitimacy%20and%20attempts%20to%20evade%20some%20automated%20analysis%20systems%E2%80%94%3CWBR%20%2F%3Ebefore%20taking%20the%20user%20to%20a%20fake%20sign-in%20page.%20This%20ultimately%20leads%20to%20credential%20compromise%2C%20which%20opens%20the%20user%20and%20their%20organization%20to%20other%20attacks.%3C%2FP%3E%0A%3CP%20class%3D%22x-hidden-focus%22%3EThe%20use%20of%20open%20redirects%20in%20email%20communications%20is%20common%20among%20organizations%20for%20various%20reasons.%20For%20example%2C%20sales%20and%20marketing%20campaigns%20use%20this%20feature%20to%20lead%20customers%20to%20a%20desired%20landing%20web%20page%20and%20track%20click%20rates%20and%20other%20metrics.%20However%2C%20attackers%20could%20abuse%20open%20redirects%20to%20link%20to%20a%20URL%20in%20a%20trusted%20domain%20and%20embed%20the%20eventual%20final%20malicious%20URL%20as%20a%20parameter.%20Such%20abuse%20may%20prevent%20users%20and%20security%20solutions%20from%20quickly%20recognizing%20possible%20malicious%20intent.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2689406%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EEmail%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%20Defender%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Office%20365%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Open-redirects-440x268.jpg

Widespread credential phishing campaign abuses open redirector links | Microsoft Security Blog

Microsoft has been actively tracking a widespread credential phishing campaign using open redirector links. Attackers combine these links with social engineering baits that impersonate well-known productivity tools and services to lure users into clicking. Doing so leads to a series of redirections—including a CAPTCHA verification page that adds a sense of legitimacy and attempts to evade some automated analysis systems—before taking the user to a fake sign-in page. This ultimately leads to credential compromise, which opens the user and their organization to other attacks.

The use of open redirects in email communications is common among organizations for various reasons. For example, sales and marketing campaigns use this feature to lead customers to a desired landing web page and track click rates and other metrics. However, attackers could abuse open redirects to link to a URL in a trusted domain and embed the eventual final malicious URL as a parameter. Such abuse may prevent users and security solutions from quickly recognizing possible malicious intent.

0 Replies