• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Microsoft Warns Of Widespread Phishing Attacks Using Open Redirects

Olagoke Ajibola by Olagoke Ajibola
August 30, 2021
in Security, Service news
Share on FacebookShare on Twitter

 

Microsoft team has warned that it has been tracking a widespread credential-phishing campaign that relies on open redirector links, in email communications as a vector to simultaneously trick users into visiting malicious websites while effectively bypassing security software.

In a blog post, the Microsoft 365 Defender Threat Intelligence Team said “Attackers combine these links with social engineering baits that impersonate well-known productivity tools and services to lure users into clicking.” The team added that “Doing so leads to a series of redirections – including a CAPTCHA verification page that adds a sense of legitimacy and attempts to evade some automated analysis systems – before taking the user to a fake sign-in page.” “This ultimately leads to credential compromise, which opens the user and their organization to other attacks,” the team said.

An open redirect is when a web application allows an HTTP parameter to contain a user-supplied URL that causes the HTTP request to be redirected to the referenced resource. The redirect links in email messages serve a vital tool to take recipients to third-party websites or track click rates and measure the success of sales and marketing campaigns. In this case, the same technique has been abused by adversaries to redirect such links to their own infrastructure and at the same time keeping the trusted domain in the full URL intact to evade analysis by anti-malware engines, even when users attempt to hover on links to check for any signs of suspicious content.

According to Microsoft, the messages in this particular campaign, according to the company, tend to follow a common pattern. They use a few generic subject lines in this manner:

  • [Recipient username] 1 New Notification
  • Report Status for [Recipient Domain Name] at [Date and Time]
  • Zoom Meeting for [Recipient Domain Name] at [Date and Time]
  • Status for [Recipient Domain Name] at [Date and Time]
  • Password Notification for [Recipient Domain Name] at [Date and Time]
  • [Recipient username] eNotification.

To give the attack a veneer of authenticity, clicking the specially-crafted links redirects the users to a malicious landing page that employs Google reCAPTCHA to block any dynamic scanning attempts. Upon completion of the CAPTCHA verification, the victims are displayed a fraudulent login page mimicking a known service like Microsoft Office 365 or Zoom, only to swipe their passwords upon submitting the information.

Microsoft says it has detected at least 350 unique phishing domains involved in this campaign to mislead unsuspecting victims. According to the Intelligence Team “This phishing campaign exemplifies the perfect storm of [social engineering, detection evasion, and a large attack infrastructure] in its attempt to steal credentials and ultimately infiltrate a network.” The team added, “Organizations must therefore have a security solution that will provide them multi-layered defense against these types of attacks, given that 91% of all cyber-attacks originate with email.”

Related Posts:

  • 1743588188581
    Hackers use Microsoft Teams to spread Matanbuchus malware
  • skynews-russia-hacker_5812455
    Russian Hackers Target WhatsApp for Data on Ukraine
  • edge
    Microsoft Restricts Edge IE Mode After Zero-Day Attacks
  • Microsoft
    Microsoft Shuts 338 Domains in Nigeria-Linked…
  • Outlook-search-Problem-after-Windows-10-security-patch-confirmed
    Microsoft Confirms June Outlook Outages Was A DDoS Attack
  • phishing
    Google's Email Cloaking Could be a Defence Against…
  • Microsoft_Office_Outlook_(2018–present).svg
    16 Days: Countdown to Outlook’s New Rules for 500M Users
  • VoidProxy_adminPanel_Login
    VoidProxy Targets Microsoft 365 & Google Accounts

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: domainmalwaremicrosoftsecuritysoftwareunited states
Olagoke Ajibola

Olagoke Ajibola

Olagoke Ajibola is a creative writer and content producer with an eye for details and excellence. He has a demonstrated history of telling stories for TV, Film and Online. Aside from being fascinated by the power of imagination, his other interest are travel, sport, reading and meeting people.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Meta Previews New AI Parental Controls October 18, 2025
  • ChatGPT Mobile App Sees Drop in Usage and Downloads October 18, 2025
  • Facebook’s AI Now Suggests Photo Edits on Phones October 18, 2025
  • Reddit Expands AI Search to 5 New Languages October 18, 2025
  • Meta Ends Messenger Desktop Apps for Mac and Windows October 18, 2025
  • Microsoft Rolls Out New Windows 11 AI Copilot Features October 16, 2025

Browse Archives

October 2025
MTWTFSS
 12345
6789101112
13141516171819
20212223242526
2728293031 
« Sep    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.