Tuesday, August 5, 2025
No Result
View All Result
  • Home
  • Guest Post
  • Submit Review Article
  • Contact
Somali Update
  • Headlines
    • Politics
  • Auto
    • Bike
    • Car
  • Business
    • Finance
    • Funding
    • Internet Marketing
    • Entrepreneurship
    • Startups
    • Insurance
    • Real Estate
  • Crypto
    • Bitcoin
    • Ethereum
    • Altcoins
    • Crypto Airdrop
    • ICO News
  • Entertainment
    • Poll
    • Quiz
  • Lifestyle
    • Health
    • Fashion
    • Food
    • Romance
    • Travel
  • Sports
    • Baseball
    • Basketball
    • Cricket
    • Football
    • Hockey
    • NFL
    • Tennis
    • WWE
  • Tech
    • Gadgets
    • Hardware
    • Software
    • Android
    • iOS
    • Social Media
  • Casino
    • Betting
  • Headlines
    • Politics
  • Auto
    • Bike
    • Car
  • Business
    • Finance
    • Funding
    • Internet Marketing
    • Entrepreneurship
    • Startups
    • Insurance
    • Real Estate
  • Crypto
    • Bitcoin
    • Ethereum
    • Altcoins
    • Crypto Airdrop
    • ICO News
  • Entertainment
    • Poll
    • Quiz
  • Lifestyle
    • Health
    • Fashion
    • Food
    • Romance
    • Travel
  • Sports
    • Baseball
    • Basketball
    • Cricket
    • Football
    • Hockey
    • NFL
    • Tennis
    • WWE
  • Tech
    • Gadgets
    • Hardware
    • Software
    • Android
    • iOS
    • Social Media
  • Casino
    • Betting
No Result
View All Result
Somali Update
No Result
View All Result

Hackers Exploit Link-Wrapping Security Features to Lure Microsoft 365 Credentials

by Paul Carter
1 day ago
in News, Technology
Reading Time: 5 mins read
0
Home News
Share on FacebookShare on TwitterShare on WhatsAppShare on Telegram

Cybercriminals have found a clever way to mask phishing links using trusted security services. Their latest trick? Exploiting the very tools meant to protect users.

Trusted Services Turned Into Trojan Horses

A group of threat actors has been using legitimate link-wrapping features from major cybersecurity firms—namely Proofpoint and Intermedia—to deliver phishing emails aimed at stealing Microsoft 365 login credentials. The campaign, which ran from June through July, fooled even seasoned users by disguising malicious links as trusted, security-scanned URLs.

Link wrapping, in theory, helps protect users by scanning links and routing them through safe domains. But in this case, it became a vehicle for deception.

Instead of protecting, it redirected victims straight into the hands of attackers.

Cloudflare’s Email Security team flagged the unusual behavior after noticing email accounts protected by these services were being used to send out the wrapped phishing links. That was the first red flag: compromised accounts inside secure environments were spreading harmful payloads.

microsoft 365 phishing email screenshot 2025

Multi-Tiered Redirects Make It Harder to Catch

The attackers didn’t just rely on a single method. They layered their approach, using URL shorteners, multiple redirects, and compromised accounts. The idea was simple: if you can confuse the trail, you can increase the chance someone clicks.

First, a malicious link was shortened using a common URL shortener. Then, it was sent from a compromised account protected by either Proofpoint or Intermedia. These services automatically wrapped the link, further masking it behind their own trusted domains.

With each added layer, the real destination got fuzzier.

Cloudflare’s team noted how Proofpoint’s wrapping was particularly exploited using “multi-tiered redirect abuse.” Victims would land on a seemingly safe link, only to be funneled through redirects until they arrived at a phishing page mimicking Microsoft 365.

This wasn’t just about masking—it was a digital shell game.

Deceptive Emails Disguised as Business Tools

The phishing emails were carefully crafted to look like everyday workplace notifications. No flashy red flags. Just typical business as usual: new voicemail alerts, Microsoft Teams messages, or secure file sharing links.

A single sentence here: Nothing out of the ordinary—until you clicked.

Cloudflare’s research points to two primary types of email bait:

  • Fake Teams notifications: Clicking “Reply” sent users to a Microsoft login lookalike page.

  • Voicemail or secure document alerts: Users were lured to a page hosted on Constant Contact, posing as a Microsoft 365 login portal.

In both cases, the emails were sent from seemingly secure accounts, with URLs masked by known protection services. To the untrained eye—and even to some trained ones—these looked safe.

That’s what made them so effective.

Phishing Infrastructure Hidden in Plain Sight

The infrastructure used for these phishing pages wasn’t dark web black markets or obscure foreign hosts. It was out in the open. Constant Contact, a well-known email and digital marketing service, unknowingly hosted some of the phishing content.

In one instance, a fake Microsoft Teams message carried a link wrapped by Intermedia. That link eventually led to a Constant Contact-hosted page that mimicked Microsoft’s login interface.

This technique—using reputable services to hide malicious activity—is becoming more common. What’s new is the method of laundering phishing links through link-wrapping filters meant to stop them.

Table: Breakdown of the Campaign Mechanics

Here’s a simplified look at how this attack chain played out across services:

Step Action Service Abused
1 Link shortened via URL shortener Bitly, TinyURL, etc.
2 Sent from compromised secure account Proofpoint/Intermedia
3 Link automatically wrapped by security service Proofpoint/Intermedia
4 Redirect to phishing site hosted on legit domain Constant Contact
5 Fake login page collects Microsoft 365 creds N/A

Each step added a layer of legitimacy. By the time users reached the phishing page, many had already let their guard down.

Abusing Trust in Email Security

Security tools aren’t just technical. They’re psychological. People trust branded domains. When they see a link prefaced by Proofpoint or Intermedia, it reassures them.

That’s exactly what these attackers played on.

By compromising accounts protected by these services, the adversaries not only gained access to a platform but also to its inherent credibility. The wrapped URLs weren’t flagged by most scanners because they appeared to be already vetted.

What makes this even more concerning is that link wrapping is used across enterprise environments, not just by a few niche players. And once one compromised account starts sending these emails, the ripple effect is fast and hard to track.

An Escalation in Phishing Sophistication

Phishing tactics evolve constantly. But this campaign marks a distinct shift: attackers aren’t just fooling users—they’re fooling the systems designed to protect them.

Unlike brute-force tactics or spammy fake emails, this method was calculated and deliberate. It relied on user psychology, trusted security infrastructure, and subtlety.

  1. Cloudflare’s team says this represents a “recent development” in phishing strategy.

  2. It’s a reminder that no security measure is failproof.

  3. And when the tools meant to stop attacks are turned against us, the lines blur fast.

Paul Carter

Paul Carter

Paul Carter is a talented author and a dedicated SEO specialist. Paul's extensive knowledge of SEO techniques, including keyword research, on-page optimization, and link building strategies, allows him to develop effective strategies tailored to each client's unique needs.

Related Posts

Silent Hill f gameplay combat screenshot

Silent Hill f Sparks Fan Debate Over “Soulslike” Combat Shift

1 day ago
lenovo-yoga-7-14-inch-oled-laptop-2025

Lenovo Yoga 7 Laptop Sees Massive Price Drop to $600 — Here’s Why It’s Worth Grabbing Now

3 days ago
nvidia stock price ai chip demand 2025

Nvidia Surpasses Apple in Market Value as AI Chip Demand Surges

3 days ago
steam library game sorting customization screenshot

Valve’s New Steam Beta Finally Lets You Rename and Reorganize Your Games

4 days ago
figma stock ipo debut trading screen nyse

Figma Skyrockets 250% on IPO Debut, Valuation Nears $60 Billion

4 days ago
apple iphone sales china 2025 earnings report

Apple Faces Sharp Drop in iPhone Sales as China Market Weakens

5 days ago

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

SEARCH

No Result
View All Result

TRENDING

  • Trending
  • Comments
  • Latest
Raja Rani Coupon Result

Raja Rani Result Today: Raja Rani Result 28th August Live Updates

August 28, 2024
SkymoviesHD

SkymoviesHD Proxy to Unblock Site – SkymoviesHD Movies Download

March 6, 2024
Control Bionics Secures Major US Reimbursement for NeuroNode Device

Control Bionics Secures Major US Reimbursement for NeuroNode Device

August 19, 2024
Moviesda

Moviesda Proxy to Unblock Links – Moviesda Movie Download

March 6, 2024
near lossless electrical transmission discovery by mit scientists

Near-Lossless Electrical Transmission: A Breakthrough by MIT Scientists

September 12, 2024
Bigg Boss 7 Tamil Contestants Salary

Bigg Boss 7 Tamil Contestants Salary Per Day Revealed

January 9, 2024
Vegamovies

Vegamovies Proxy to Unblock Links – Vegamovies Movies Download

March 6, 2024
iBOMMA

iBOMMA Proxy to Unblock, Movies – IBOMMA Movie Download

March 6, 2024
Kolkata FF Fatafat Result

Kolkata FF Fatafat Result 24th January 2024 Live Updates

January 24, 2024
Tamilblasters

TamilBlasters Proxy – Unblock Links, Tamilblasters Movies Download

March 6, 2024

Business Ideas with Low Investment and High Profit

1
Bhutan Teer Result 2021

Bhutan Teer Result Today Live: Bhutan Teer Result 3rd January Update

1

Reasons to Join the PKT Cash Crypto Network

1
Kolkata FF Fatafat Result

Kolkata FF Fatafat Result 24th January 2024 Live Updates

1
Coinbase

Coinbase Crypto Exchange hires Jeff Horowitz as their CCO

0
Kucoin

KuCoin Scam? Office Location issue clarified

0
Nokia 5G mobile

Nokia 5G Mobile to be launched with T-Mobile soon

0
CasinoBuzz

Casino.Buzz: One of the most Informative Online Casino Review Website

0
Facebook Ban alex jones

Facebook Suspends Alex Jones for Hate Speech

0
Good Rummy Party

What Makes a Good Rummy Party?

0
Silent Hill f gameplay combat screenshot

Silent Hill f Sparks Fan Debate Over “Soulslike” Combat Shift

August 4, 2025
microsoft 365 phishing email screenshot 2025

Hackers Exploit Link-Wrapping Security Features to Lure Microsoft 365 Credentials

August 4, 2025
lenovo-yoga-7-14-inch-oled-laptop-2025

Lenovo Yoga 7 Laptop Sees Massive Price Drop to $600 — Here’s Why It’s Worth Grabbing Now

August 2, 2025
nvidia stock price ai chip demand 2025

Nvidia Surpasses Apple in Market Value as AI Chip Demand Surges

August 2, 2025
steam library game sorting customization screenshot

Valve’s New Steam Beta Finally Lets You Rename and Reorganize Your Games

August 1, 2025
figma stock ipo debut trading screen nyse

Figma Skyrockets 250% on IPO Debut, Valuation Nears $60 Billion

August 1, 2025
apple iphone sales china 2025 earnings report

Apple Faces Sharp Drop in iPhone Sales as China Market Weakens

July 31, 2025
Grateful Dead 60th anniversary San Francisco Golden Gate Park 2025

Grateful Dead Turns 60: Fans Flock to San Francisco for Milestone Celebration

July 31, 2025
google-notebooklm-video-overviews-launch

Google’s NotebookLM Rolls Out Video Overviews, Redefining How We Learn From AI

July 30, 2025
sundar pichai ai glasses warby parker

Google’s AI Glasses Comments Cast a Long Shadow Over Apple’s iPhone Future

July 30, 2025

ABOUT US

From global politics to cultural trends, we bring you comprehensive coverage and diverse perspectives. Stay connected with the international community and explore stories from around the globe. Engage with our thought-provoking articles and stay informed about the world’s most pressing issues.

Contact us at ceo.somaliupdate@gmail.com

ADVERTISE WITH US

We accept following advertisement methods in our website.

  • Guest Post
  • Sponsored Post
  • Banner Ad
  • Homepage Ad
  • Sidebar Ad
  • Niche Edit
  • Link Ad
  • Review Article

POPULAR CATEGORIES

List of Popular categories in our websites which are loved more frequently by our beloved readers.

  • AUTO
  • BUSINESS
  • CRYPTO
  • GAMBLING
  • SPORTS
  • TECH
  • HEALTH

THIS WEEK POLLS

Sorry, there are no polls available at the moment.
  • Polls Archive
  • Home
  • Guest Post
  • Submit Review Article
  • Contact

© 2023 SOMALIUPDATE - Developed by VISION

No Result
View All Result
  • Headlines
    • Politics
  • Auto
    • Bike
    • Car
  • Business
    • Finance
    • Funding
    • Internet Marketing
    • Entrepreneurship
    • Startups
    • Insurance
    • Real Estate
  • Crypto
    • Bitcoin
    • Ethereum
    • Altcoins
    • Crypto Airdrop
    • ICO News
  • Entertainment
    • Poll
    • Quiz
  • Lifestyle
    • Health
    • Fashion
    • Food
    • Romance
    • Travel
  • Sports
    • Baseball
    • Basketball
    • Cricket
    • Football
    • Hockey
    • NFL
    • Tennis
    • WWE
  • Tech
    • Gadgets
    • Hardware
    • Software
    • Android
    • iOS
    • Social Media
  • Casino
    • Betting

© 2023 SOMALIUPDATE - Developed by VISION