A danger is misusing the link rapping services link from actor reputed technology companies, which is to mask malicious links for Microsoft 365 Fishing pages that collect login credentials.
The attacker exploited URL security facility from Cyber Security Company Proofpoint and Cloud Communications firm Intermedia in campaigns from July from July.
Some email security services include a link wrapping feature that re -writes a reliable domain to the URL and passes them through the scanning server designed to block malicious destinations.
Fishing URL to legalize
Cloudflare’s email security team found that adversity legalized the malicious URL after compromising proofpoints and intermediate email accounts, and possibly used their unauthorized access to distribute the “laundered” link.
Researchers said, “The attackers wrapped the proofpoint link in various ways, including multi-tier redirect misuse with URL shortnors through compromised accounts.”
“Intermediate link rapping abuses we saw that the focus was also focused on achieving unauthorized access to the protected email accounts by link rapping” – – – Cloudflare email safety
The actor with danger added an obfuscation layer by shortening the malicious link before sending from a protected account, which automatically wrapped the link.
Researchers say that the attacker lured the victims with fake information for Visimle or shared documents from Microsoft teams. At the end of the redirect chain, there was a Microsoft Office 365 Fishing page that collected credentials.

Source: Cloudflare email safety
In the campaign that misused the service of intermediate, the danger actor distributed emails pretending to be a safe document, pretending to be “Zix” safe message notification, or applied a communication from the Microsoft teams that gave information about a newly received message.
The alleged link for the document was a URL wrapped by the service of intermediate and was redirected to a fake page from the digital and email marketing platform that constantly contacts the Fishing page hosting the Fishing page.
In the notice of fake teams, clicking on the answer button, the Microsoft Fishing page was led which would collect login credentials.
Researchers at Claudflare stated that the danger actor increased the possibility of a successful attack by disguising malicious destinations with valid email protection URL.
It should be noted that misuse of legitimate services to give malicious payload is not new, but exploiting link-ripping security facility is a recent development on the fishing scene.