Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses

Threat Actors Attacking Outlook and Google Bypassing Traditional Email Defenses

Posted on November 11, 2025November 11, 2025 By CWS

E mail-based threats have reached a crucial inflection level within the third quarter of 2025.

Menace actors are systematically exploiting weaknesses in conventional electronic mail safety defenses by focusing on the world’s two largest electronic mail ecosystems: Microsoft Outlook and Google Gmail.

The Q3 E mail Menace Developments Report reveals that over 90 p.c of phishing assaults now think about these two platforms, signaling a deliberate shift in attacker technique towards high-value targets.

The dimensions of this marketing campaign is staggering. VIPRE safety researchers analyzed 1.8 billion emails throughout the quarter and recognized 26 million extra malicious messages in comparison with the identical interval final 12 months—a 13 p.c year-over-year enhance.

What’s notably alarming is that attackers are now not counting on subtle malware alone. As a substitute, they’re weaponizing simplicity itself, leveraging on a regular basis strategies in terribly intelligent methods to slide previous standard safety layers.

The assault panorama has basically shifted. Malicious emails at the moment are evenly break up between content-based threats and link-based assaults, every accounting for about 48 to 52 p.c of detected threats.

Extra regarding is that 148,000 beforehand unknown malicious attachments bypassed conventional filters in the course of the quarter, caught solely by means of superior sandboxing strategies.

Moreover, VIPRE detected over 67,000 malicious hyperlinks that had by no means been encountered earlier than, underscoring the continual evolution of menace supply mechanisms.

Vipre safety analysts recognized a classy evasion sample rising throughout these campaigns.

Menace actors are utilizing compromised reliable URLs and open redirect strategies to masks their malicious touchdown pages.

Roughly 79.4 p.c of phishing URLs exploit compromised web sites moderately than newly registered domains, permitting attackers to inherit the repute scores of reliable enterprises.

When a person clicks what seems to be a trusted hyperlink originating from a identified group, they’re silently redirected to a credential harvesting web page.

This method defeats electronic mail safety instruments that scan solely the top-level URL with out analyzing full request chains.

The focusing on of Outlook and Google represents a calculated enterprise determination by attackers. Each platforms host huge enterprise and private person bases, making them high-probability targets for credential theft and enterprise electronic mail compromise assaults.

An infection mechanism

By specializing in these two ecosystems, menace actors eradicate the necessity for platform-specific customization whereas maximizing potential returns on their operational funding.

The an infection mechanism employed in these campaigns sometimes begins with social engineering.

Phishing attachments predominantly encompass PDF recordsdata, which symbolize 75 p.c of all malicious attachments.

These paperwork are universally trusted as reliable enterprise correspondence, offering the proper computer virus for preliminary compromise.

Upon opening, customers encounter faux login screens or requests for credential verification, typically disguised as pressing safety alerts or account verification necessities particular to their electronic mail supplier.

Persistence ways have developed past conventional malware set up. As a substitute of building persistence by means of system-level modifications, attackers now deal with account takeover by means of credential harvesting.

As soon as electronic mail credentials are compromised, attackers achieve persistent entry to each the inbox and linked cloud companies, enabling lateral motion by means of organizational networks.

Detection evasion stays central to those assaults. By splitting multi-step redirect chains throughout mother or father URLs and touchdown pages, attackers be certain that safety scanners analyzing particular person elements miss the whole assault chain.

When mixed with the 60 p.c surge in industrial spam creating background noise, the excellence between reliable and malicious messages turns into more and more tough for each automated programs and human operators to establish.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Attacking, Bypassing, Defenses, Email, Google, Outlook, Threat, Traditional

Post navigation

Previous Post: Zoom Vulnerabilities Let Attackers Bypass Access Controls to Access Session Data
Next Post: WatchGuard Firebox Firewall Vulnerability Let Attackers Gain Unauthorized SSH Access

Related Posts

Multiple Jenkins Vulnerability SAML Authentication Bypass And MCP Server Plugin Permissions Multiple Jenkins Vulnerability SAML Authentication Bypass And MCP Server Plugin Permissions Cyber Security News
Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Lumma Infostealer Malware Attacks Users to Steal Browser Cookies, Cryptocurrency Wallets and VPN/RDP Accounts Cyber Security News
Microsoft Exchange Online Misidentifies Emails as Phishing Microsoft Exchange Online Misidentifies Emails as Phishing Cyber Security News
Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon Cyber Security News
Threat actors Breach High Value targets like Google in Salesforce Attacks Threat actors Breach High Value targets like Google in Salesforce Attacks Cyber Security News
WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code WatchGuard VPN Vulnerability Let Remote Attacker Execute Arbitrary Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News