Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Tactics Exploit Safe Links with Complex URL Rewrites

Phishing Tactics Exploit Safe Links with Complex URL Rewrites

Posted on March 17, 2026 By CWS

Phishers have devised a method to misuse a common security feature, turning it against users rather than protecting them. By manipulating URL rewriting, a mechanism in many enterprise email systems, attackers are enabling malicious content to bypass detection, using trusted safe links as their vehicle.

URL rewriting typically involves transforming links in emails to pass through security scanning servers when clicked. However, cybercriminals are exploiting this by leveraging compromised accounts where URL rewriting is enabled, creating seemingly safe links that are actually harmful. This has transformed a formerly dependable security layer into a deceptive tool.

Exploiting URL Rewriting Techniques

URL rewriting is designed to replace inbound email links with vendor-generated URLs, scrutinizing them for threats when accessed. Threat actors have capitalized on this by producing pre-wrapped safe links through compromised accounts, using them in extensive phishing schemes. These links appear trustworthy as they carry a recognized vendor domain.

LevelBlue analysts noted a rise in this tactic in 2025, observing a shift from single-layer to multi-layer URL rewriting chains across reputable vendor domains. The strategy involves creating complex redirect sequences that evade automated scanners by obscuring the true destination.

Phishing-as-a-Service Platforms

Significant activity was seen on phishing platforms like Tycoon2FA and Sneaky2FA, both targeting Microsoft 365 users. These platforms employ adversary-in-the-middle methods to capture credentials and multi-factor authentication cookies in real-time, facilitating account takeovers without user awareness.

Once inside a compromised system, attackers can manipulate email rules, initiate phishing campaigns, exfiltrate data, and potentially deploy ransomware. Campaigns using multiple URL rewriting services emerged mid-2025, peaking in early 2026, indicating a trend towards more complex redirect chains.

Defense Strategies and Recommendations

Organizations should consider adopting phishing-resistant multi-factor authentication methods, such as hardware security keys, to mitigate risks even when credentials are compromised. Security teams must implement behavior-based detection systems that identify emails with links passing through multiple rewriting layers.

Employee training is crucial, encouraging skepticism towards unexpected authentication prompts, regardless of domain familiarity. Programs should emphasize that a vendor-branded URL does not assure safety. All suspicious communications should be promptly reported to security personnel.

Stay informed by following us on Google News, LinkedIn, and X, and set CSN as your preferred source for the latest updates.

Cyber Security News Tags:credential theft, Cybersecurity, email security, Microsoft 365, multi-layered attacks, Phishing, security vendors, Sneaky2FA, Tycoon2FA, URL rewriting

Post navigation

Previous Post: CISA Highlights Exploited Wing FTP Security Flaw
Next Post: RondoDox Botnet Expands to 174 Vulnerabilities

Related Posts

Google’s AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation Google’s AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation Cyber Security News
SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar Cyber Security News
Scattered Lapsus$ Hunters Launched a New Leak Site to Release Data Stolen from Salesforce Instances Scattered Lapsus$ Hunters Launched a New Leak Site to Release Data Stolen from Salesforce Instances Cyber Security News
United Natural Foods Suffers Cyberattack United Natural Foods Suffers Cyberattack Cyber Security News
InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters Cyber Security News
Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Security Flaw in UK Companies House Web Application Exposed
  • LeakNet Ransomware Adopts ClickFix for Attacks
  • Critical Kubernetes NFS Driver Flaw Exposes Server Risks
  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Security Flaw in UK Companies House Web Application Exposed
  • LeakNet Ransomware Adopts ClickFix for Attacks
  • Critical Kubernetes NFS Driver Flaw Exposes Server Risks
  • Surf AI Secures $57M for Innovative Security Operations
  • New Malware Strains Increase Threats to Network Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News