Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why do I suggest this budget phone with a paper -like screen on ‘minimal’ equipment

    August 4, 2025

    Inexpensive optical brain imaging advance

    August 4, 2025

    Lastpass can now warn or block login to shadow the mother -in -law app – how is here

    August 4, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Attackers exploit link-rapping services to steal Microsoft 365 login
    Security

    Attackers exploit link-rapping services to steal Microsoft 365 login

    PineapplesUpdateBy PineapplesUpdateAugust 4, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Attackers exploit link-rapping services to steal Microsoft 365 login
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Attackers exploit link-rapping services to steal Microsoft 365 login

    A danger is misusing the link rapping services link from actor reputed technology companies, which is to mask malicious links for Microsoft 365 Fishing pages that collect login credentials.

    The attacker exploited URL security facility from Cyber Security Company Proofpoint and Cloud Communications firm Intermedia in campaigns from July from July.

    Some email security services include a link wrapping feature that re -writes a reliable domain to the URL and passes them through the scanning server designed to block malicious destinations.

    Fishing URL to legalize

    Cloudflare’s email security team found that adversity legalized the malicious URL after compromising proofpoints and intermediate email accounts, and possibly used their unauthorized access to distribute the “laundered” link.

    Researchers said, “The attackers wrapped the proofpoint link in various ways, including multi-tier redirect misuse with URL shortnors through compromised accounts.”

    “Intermediate link rapping abuses we saw that the focus was also focused on achieving unauthorized access to the protected email accounts by link rapping” – – – Cloudflare email safety

    The actor with danger added an obfuscation layer by shortening the malicious link before sending from a protected account, which automatically wrapped the link.

    Researchers say that the attacker lured the victims with fake information for Visimle or shared documents from Microsoft teams. At the end of the redirect chain, there was a Microsoft Office 365 Fishing page that collected credentials.

    Microsoft 365 Fishing Link-Rapping facility was distributed by exploiting facility
    Microsoft 365 Fishing Link-Rapping facility was distributed by exploiting facility
    Source: Cloudflare email safety

    In the campaign that misused the service of intermediate, the danger actor distributed emails pretending to be a safe document, pretending to be “Zix” safe message notification, or applied a communication from the Microsoft teams that gave information about a newly received message.

    The alleged link for the document was a URL wrapped by the service of intermediate and was redirected to a fake page from the digital and email marketing platform that constantly contacts the Fishing page hosting the Fishing page.

    In the notice of fake teams, clicking on the answer button, the Microsoft Fishing page was led which would collect login credentials.

    Researchers at Claudflare stated that the danger actor increased the possibility of a successful attack by disguising malicious destinations with valid email protection URL.

    It should be noted that misuse of legitimate services to give malicious payload is not new, but exploiting link-ripping security facility is a recent development on the fishing scene.


    Picus Red Report 2025

    Malware targeting password stores increased 3x as the attackers secretly carried out the perfect history landscape, infiltrated and exploited important systems.

    Search for the top 10 Metter Att & CK techniques behind the 93% attacks and how to defend them.

    attackers exploit linkrapping login Microsoft services steal
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleFlipkart Freedom Sale: Top Tablet deal you should not miss you
    Next Article IOS 18.6 24 Cures Security Doshas – update your iPhone right now
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Lastpass can now warn or block login to shadow the mother -in -law app – how is here

    August 4, 2025
    Security

    Mozilla warns of fishing attacks targeting ad-on developers

    August 4, 2025
    Security

    MCP: Reserve the backbone of agent AI

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Why do I suggest this budget phone with a paper -like screen on ‘minimal’ equipment

    August 4, 2025

    Inexpensive optical brain imaging advance

    August 4, 2025

    Lastpass can now warn or block login to shadow the mother -in -law app – how is here

    August 4, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.