Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Abuse Proofpoint’s and Intermedia’s Link Wrapping Features to Hide Phishing Payloads

Posted on August 1, 2025August 1, 2025 By CWS

The most recent wave of credential-phishing campaigns has revealed an unexpectedly handy ally for menace actors: the very e-mail safety suites meant to guard customers.

First noticed in late July 2025, a number of phishing clusters started embedding malicious URLs contained in the official link-wrapping providers of Proofpoint’s Shield platform ( and Intermedia’s LinkSafe (

As a result of company filters already belief these domains, the wrapped hyperlinks traverse mail gateways uninspected, touchdown instantly in customers’ inboxes.

The assault chain is deceptively easy. Victims obtain invoices, DocuSign requests, or transport notices whose call-to-action buttons level to a wrapped URL.

When clicked, Proofpoint or Intermedia first decodes after which silently forwards the browser to an attacker-controlled web site that imitates Microsoft 365 or Okta single-sign-on pages.

Cloudflare researchers famous that the intermediate “trusted” hop neuters most sandbox detonations as a result of the ultimate vacation spot is resolved solely contained in the person’s session, successfully short-circuiting heuristic URL repute checks.

Marketing campaign telemetry collected by open redirect sensors exhibits greater than 180,000 messages since August 1 concentrating on monetary providers, authorized companies, and better training.

Phishing electronic mail posing as a voicemail notification containing a wrapped hyperlink (Supply – Cloudflare)

In a number of incidents, compromised mailboxes have been weaponized inside minutes to propagate the lure additional, amplifying inside unfold whereas masquerading as official reply-threads.

Phishing electronic mail posing as a Microsoft Groups Doc (Supply – Cloudflare)

The abuse underscores the paradox by which safety controls—when insufficiently scoped—grow to be high-fidelity cloaks for adversaries.

Detection Evasion by way of Opportunistic URL Rewriting

In contrast to conventional phishing that depends on freshly registered typo-domains, these campaigns exploit conditional URL decision.

Proofpoint’s wrapper shops the goal in a base64-encoded u= parameter, whereas an HMAC signature in ok= assures integrity.

Safety merchandise sometimes confirm solely the HMAC earlier than classifying the hyperlink as protected; they don’t dereference the payload throughout scanning as a result of doing so would destroy the wrapper’s anti-tampering seal.

Microsoft phishing web page designed to reap credentials (Supply – Cloudflare)

Attackers merely generate a legitimate hyperlink by letting Proofpoint create the wrapper on a benign web site, then enhancing the base64 payload with out updating the signature—Proofpoint nonetheless masses the URL however can’t assure authenticity, inflicting a silent ahead.

The next Python fragment replicates the tampering step and highlights why static scanners miss it:-

import base64, urllib.parse, re

wrapped = (”
“u=aHR0cHM6Ly93d3cuZXhhbXBsZS5jb20vP3Byb2Quaj0x&ok=abcd1234″)

payload = re.search(r”u=([^&]+)”, wrapped).group(1)
decoded = base64.urlsafe_b64decode(payload + “==”).decode()
print(‘Unique goal:’, decoded)

new_target = ”
new_payload = base64.urlsafe_b64encode(new_target.encode()).decode().rstrip(“=”)
tampered = re.sub(r”u=[^&]+”, f”u={urllib.parse.quote(new_payload)}”, wrapped)

print(‘Tampered wrapper:’, tampered)

As a result of the ok= signature isn’t re-computed, Proofpoint flags the hyperlink as “modified” however nonetheless performs the ahead—a usability concession attackers now exploit.

Intermedia’s LinkSafe exhibits a similar weak spot, missing any integrity token in any respect.

Till Proofpoint and Intermedia revise their validation logic to dam or at the least visibly warn on signature mismatches, defenders should depend on full URL detonation and on-endpoint heuristics.

Community groups are suggested to strip or rewrite wrapped hyperlinks on the secure-gateway layer, whereas SOCs ought to hunt for base64 strings inside u= parameters that decode to exterior domains.

At its core, the episode is a cautionary story: safety layers that achieve isolation can, when chained collectively with out holistic menace modeling, open a friction-free freeway straight to the attacker’s payload.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Abuse, Actors, Features, Hide, Intermedias, Link, Payloads, Phishing, Proofpoints, Threat, Wrapping

Post navigation

Previous Post: Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000
Next Post: CISA Issues ICS Advisories for Rockwell Automation, VMware, and Güralp Seismic Monitoring Systems

Related Posts

New Report Claims Microsoft Used China-Based Engineers For SharePoint Support and Bug Fixing Cyber Security News
Sturnus Banking Malware Steals Communications from Signal and WhatsApp, Gaining Full Control of The Device Cyber Security News
CrowdStrike Warns of New Mass Exploitation Campaign Leveraging Oracle E-Business Suite 0-Day Cyber Security News
See Cyber Threats to Your Industry and Region in Just 2 Seconds Cyber Security News
Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Cyber Security News
Critical SAP S/4HANA Vulnerability Actively Exploited to Fully Compromise Your SAP System Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft 365 Services and Copilot Outage Hits Users in Japan and China
  • Kimsuky Hackers Attacking Users via Weaponized QR Code to Deliver Malicious Mobile App
  • Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign
  • SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances
  • Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft 365 Services and Copilot Outage Hits Users in Japan and China
  • Kimsuky Hackers Attacking Users via Weaponized QR Code to Deliver Malicious Mobile App
  • Operation ForumTrol Known for Exploiting Chrome 0-Day Attacking Users With New Phishing Campaign
  • SonicWall Fixes Actively Exploited CVE-2025-40602 in SMA 100 Appliances
  • Kimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark