Beware this new phishing attack that's after your passwords!

Beware this new phishing attack that's after your passwords!

That email link might not send you where you expect.

Credit: Markus Spiske / Pixabay

A classic bit of internet security advice just bit the dust. For ages, email users were told to hover their mouse over a link to see where it led—if you saw the URL of a legitimate website, you were in the clear. But on Tuesday, Microsoft shared details on a new kind of phishing attack: Email with links that contain a known website at the start, but actually redirect to a malicious page.

This ploy relies on a type of link often used by sales and marketing teams to track information about who clicks on a URL in a newsletter or on social media. Known as open redirect links, the structure of the link begins with a primary domain, then includes a string of analytics data and a final destination site.

But as Microsoft describes in a post on its security blog, this phishing strategy uses open redirect links to exploit an average end user’s security training. Because open redirects can start with any primary domain and end with any final destination, these phishing links can start with a legitimate site and then go to a malicious page.

Adding further complexity to this scheme is the use of captchas to lend an air of authenticity. Users who believe they’re on a genuine site will then enter login credentials in the belief they’re accessing a notification, report, or even Zoom meeting, only to encounter a fake error page claiming a session time-out or incorrect password—prompting a second entry of login credentials. After the phishing attempt has successfully captured the user ID and password twice, users get redirected to another genuine website.

You can see specific examples of this attack and a sample list of malicious destination URLs in Microsoft’s blog post, but you don’t need to dig that deep in order to protect yourself. Instead, start using a password manager. It won’t automatically supply your login credentials on a spoofed site. You can also look over the whole URL when mousing over, but it’s not nearly as fool-proof a method as a password manager.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.



How MSPs can capitalise on integrating AI into existing services

How MSPs can capitalise on integrating AI into existing services

​Given the pace of change, scale of digitalisation and evolution of generative AI, partners must get ahead of the trends to capture the best use of innovative AI solutions to develop new service opportunities. For MSPs, integrating AI capabilities into existing service portfolios can unlock enhancements in key areas including managed hosting, cloud computing and data centre management. This exclusive Reseller News roundtable in association with rhipe, a Crayon company and VMware, focused on how partners can integrate generative AI solutions into existing service offerings and unlocking new revenue streams.

How MSPs can capitalise on integrating AI into existing services
Access4 holds inaugural A/NZ Annual Conference

Access4 holds inaugural A/NZ Annual Conference

​Access4 held its inaugural Annual Conference in Port Douglass, Queensland, for Australia and New Zealand from 9-11 October, hosting partners from across the region with presentations on Access4 product updates, its 2023 Partner of the Year awards and more.

Access4 holds inaugural A/NZ Annual Conference
Show Comments