Geeks for your information
Hackers Leverage Safe Links and URL Rewriting to Evade Detection - Printable Version

+- Geeks for your information (https://www.geeks.fyi)
+-- Forum: News (https://www.geeks.fyi/forumdisplay.php?fid=105)
+--- Forum: Privacy & Security News (https://www.geeks.fyi/forumdisplay.php?fid=107)
+--- Thread: Hackers Leverage Safe Links and URL Rewriting to Evade Detection (/showthread.php?tid=21663)



Hackers Leverage Safe Links and URL Rewriting to Evade Detection - harlan4096 - 17 March 26

Quote:Threat actors were already abusing URL rewriting mechanisms in phishing campaigns to mask malicious domains.

URL rewriting is designed to protect users by replacing original links with security-vendor URLs that scan destinations at click time.

These rewritten links route traffic through the provider’s infrastructure so they can analyze the page in real time, block known malicious sites, and log user activity for administrators. In normal operation, this is a defensive layer that helps filter out obviously bad destinations.​

Threat actors, however, are turning this model on its head. By operating from compromised mailboxes that already use URL rewriting, they generate “pre-wrapped” safe links and then reuse those trusted-domain URLs in external phishing campaigns.

[Image: Fig01_examplephishlink.png?width=628&hei...shlink.png]Example of an original phishing link (Source : LevelBlue

SpiderLabs).The end result is a phishing link that visually and technically appears to belong to a reputable security or productivity provider, even though it eventually leads to a credential-harvesting site.

From late 2024 into 2025, LevelBlue SpiderLabs observed a sharp rise in multi-layered URL rewriting chains, where attackers nest multiple already‑rewritten links together.

Continue Reading...