Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Tactics Exploit Safe Links with Complex URL Rewrites

Phishing Tactics Exploit Safe Links with Complex URL Rewrites

Posted on March 17, 2026 By CWS

Phishers have devised a method to misuse a common security feature, turning it against users rather than protecting them. By manipulating URL rewriting, a mechanism in many enterprise email systems, attackers are enabling malicious content to bypass detection, using trusted safe links as their vehicle.

URL rewriting typically involves transforming links in emails to pass through security scanning servers when clicked. However, cybercriminals are exploiting this by leveraging compromised accounts where URL rewriting is enabled, creating seemingly safe links that are actually harmful. This has transformed a formerly dependable security layer into a deceptive tool.

Exploiting URL Rewriting Techniques

URL rewriting is designed to replace inbound email links with vendor-generated URLs, scrutinizing them for threats when accessed. Threat actors have capitalized on this by producing pre-wrapped safe links through compromised accounts, using them in extensive phishing schemes. These links appear trustworthy as they carry a recognized vendor domain.

LevelBlue analysts noted a rise in this tactic in 2025, observing a shift from single-layer to multi-layer URL rewriting chains across reputable vendor domains. The strategy involves creating complex redirect sequences that evade automated scanners by obscuring the true destination.

Phishing-as-a-Service Platforms

Significant activity was seen on phishing platforms like Tycoon2FA and Sneaky2FA, both targeting Microsoft 365 users. These platforms employ adversary-in-the-middle methods to capture credentials and multi-factor authentication cookies in real-time, facilitating account takeovers without user awareness.

Once inside a compromised system, attackers can manipulate email rules, initiate phishing campaigns, exfiltrate data, and potentially deploy ransomware. Campaigns using multiple URL rewriting services emerged mid-2025, peaking in early 2026, indicating a trend towards more complex redirect chains.

Defense Strategies and Recommendations

Organizations should consider adopting phishing-resistant multi-factor authentication methods, such as hardware security keys, to mitigate risks even when credentials are compromised. Security teams must implement behavior-based detection systems that identify emails with links passing through multiple rewriting layers.

Employee training is crucial, encouraging skepticism towards unexpected authentication prompts, regardless of domain familiarity. Programs should emphasize that a vendor-branded URL does not assure safety. All suspicious communications should be promptly reported to security personnel.

Stay informed by following us on Google News, LinkedIn, and X, and set CSN as your preferred source for the latest updates.

Cyber Security News Tags:credential theft, Cybersecurity, email security, Microsoft 365, multi-layered attacks, Phishing, security vendors, Sneaky2FA, Tycoon2FA, URL rewriting

Post navigation

Previous Post: CISA Highlights Exploited Wing FTP Security Flaw
Next Post: RondoDox Botnet Expands to 174 Vulnerabilities

Related Posts

Anthropic’s Claude Security Beta Enhances Enterprise Code Safety Anthropic’s Claude Security Beta Enhances Enterprise Code Safety Cyber Security News
Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers Cyber Security News
LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS Cyber Security News
Infostealer Malware is Being Exploited by APT Groups for Targeted Attacks Infostealer Malware is Being Exploited by APT Groups for Targeted Attacks Cyber Security News
UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware Cyber Security News
Hackers Exploit Trusted Platforms to Target Philippine Bank Users Hackers Exploit Trusted Platforms to Target Philippine Bank Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark