Phishing Frenzy: How Cybercriminals Outsmart Security with Link Wrapping Shenanigans
Cybersecurity researchers have uncovered a phishing campaign using Proofpoint link wrapping to sneak past defenses. By exploiting these trusted tools, attackers craft misleading links that redirect victims to fake Microsoft 365 pages. It’s like phishing’s version of a double agent, using the enemy’s own tactics to infiltrate their stronghold!

Hot Take:
Phishing just got a makeover, and it’s strutting down the cybersecurity runway with link-wrapped accessories and SVG bling. Who knew cybercriminals were such trendsetters? It’s like the digital version of wearing shades indoors—looks cool until you walk into a wall.
Key Points:
- Cybercriminals are exploiting link wrapping services from Proofpoint and Intermedia to hide malicious payloads.
- The campaign uses multi-tiered redirect abuse, combining URL shortening and link wrapping for double obfuscation.
- Phishing messages impersonate voicemail notifications and Microsoft Teams alerts to steal Microsoft 365 credentials.
- There’s a rising trend of using SVG files and fake Zoom links to bypass traditional security measures.
- Victims’ credentials are being exfiltrated via Telegram, adding a ‘secure’ twist to the heist.
Already a member? Log in here