Heimdal Security Blog

Microsoft Notifies About an Ongoing Open Redirects Phishing Campaign

Microsoft has announced on their website on the 26th of August about an ongoing open redirects phishing campaign that uses several techniques to trick users into clicking on compromised links. This is managed via e-mail messages that contain open redirector links which eventually lead victims to a malicious page where their credentials are stolen.

Open Redirects Phishing Campaign: What Are Open Redirects?

A web application lets an HTTP parameter have inside an URL that is user-input based, so supplied by the user. This makes the HTTP request become redirected and go to the intended source. This means an open redirect.

As Microsoft says, link redirecting is often used in marketing or sales campaigns as these have the target to determine users to access some landing pages for metrics tracking purposes. However, open redirects might be misused by hackers in phishing campaigns, because they change the value of the parameter in the URL and this eventually leads to a compromised website.

Open Redirects Phishing Campaign: the Hackers’ Methods

Image Source

In the current open redirect phishing campaign, threat actors have the following methods, according to Microsoft’s report:

Image Source

The Email Pattern

According to Microsoft’s post on the topic, most e-mail messages follow a specific pattern:

Image Source

As Microsoft declared, they have found 350 unique phishing domains that show the efforts, including financial ones, of the cybercriminals to make this open redirect phishing campaign successful. The social engineering tactics combined with evasion techniques like using legitimate services to generate the open redirects, keeping inside the full URL the entire trusted domain’s link, or using reCAPTCHA check make this open redirects phishing campaign powerful.

Attackers combine these links with social engineering baits that impersonate well-known productivity tools and services to lure users into clicking. (..) Doing so leads to a series of redirections — including a CAPTCHA verification page that adds a sense of legitimacy and attempts to evade some automated analysis systems — before taking the user to a fake sign-in page. This ultimately leads to credential compromise, which opens the user and their organization to other attacks.

Source