Phishing Upgrade: When Trusted Tech Becomes a Hacker’s Best Friend
Phishing just got a makeover! A crafty threat actor is using link wrapping services to mask malicious URLs, luring victims to Microsoft 365 phishing pages. By exploiting security features from Proofpoint and Intermedia, these links appear legitimate, increasing the chances of a successful attack. The perfect crime? More like the perfect URL disguise!

Hot Take:
Who knew that link wrapping could be the new gift wrap for cybercriminals? It seems hackers have decided to take the ‘wrap up your work’ phrase a bit too literally by wrapping their phishing schemes in layers of legitimacy. It’s like putting a bow on a bomb—deceptively pretty, but still very explosive!
Key Points:
- Threat actors abused link wrapping services to disguise phishing URLs.
- They exploited services from Proofpoint and Intermedia.
- Malicious links were masked using legitimate email protection services.
- Phishing campaigns pretended to be secure messages or Microsoft Teams notifications.
- Abusing link wrapping is a new twist on an old cybercrime tactic.
Already a member? Log in here