Article Details
Scrape Timestamp (UTC): 2025-11-10 21:30:02.336
Original Article Text
Click to Toggle View
Quantum Route Redirect PhaaS targets Microsoft 365 users worldwide. A new phishing automation platform named Quantum Route Redirect is using around 1,000 domains to steal Microsoft 365 users' credentials. The kit comes pre-configured with phishing domains to allow less skilled threat actors to achieve maximum results with the least effort. Since August, analysts at security awareness company KnowBe4 have noticed Quantum Route Redirect (QRR) attacks in the wild across a wide geography, although nearly three-quarters are located in the U.S. They say that the kit "is an advanced automation platform" that can cover all the stages of a phishing attack, from rerouting traffic to malicious domains to tracking victims. Attacks start with a malicious email made to appear as a DocuSign request, a payment notification, a missed voicemail, or a QR code. The emails direct targets to a credential harvesting page hosted on a URL that follows a specific pattern. “Our researchers also observed that the domain URLs consistently follow the pattern “/([\w\d-]+\.){2}[\w]{,3}\/quantum.php/” and are typically hosted on parked or compromised domains,” explains KnowBe4. “The choice to host on legitimate domains can help to socially engineer the human targets of these attacks.” KnowBe4 says it has identified about 1,000 domains hosting QRR phishing pages. A built-in filtering mechanism can distinguish between bots and human visitors, the researchers say, adding that QRR can redirect potential victims to a phishing page, while automated systems, such as email security tools, are sent to benign sites. As the central traffic routing system on QRR performs its redirecting tasks automatically, operators can view the related statistics on the dashboard, where the number of real versus non-human visitors is logged in real-time. KnowBe4 has observed the QRR phishing kit targeting Microsoft 365 accounts across 90 countries, but 76% of the attacks were directed at users in the U.S. The researchers expect the use of Quantum Route Redirect to increase due to the methods used to evade URL scanning technologies. Similar services that gained prominence earlier this year include VoidProxy, Darcula, Morphing Meerkat, and Tycoon2FA. However, there are defense methods that can protect against this threat. KnowBe4 analysts recommend implementing robust URL filtering that can detect phishing attempts, along with tools that can monitor accounts for signs of compromise if a user's credentials are stolen. The 2026 CISO Budget Benchmark It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026. Learn how top leaders are turning investment into measurable impact.
Daily Brief Summary
Quantum Route Redirect, a phishing automation platform, is exploiting around 1,000 domains to steal Microsoft 365 credentials, impacting users worldwide, with 76% of attacks targeting the U.S.
The platform enables less skilled cybercriminals to execute sophisticated phishing attacks by automating traffic rerouting and victim tracking, increasing the threat landscape.
Phishing emails mimic legitimate communications like DocuSign requests or payment notifications, directing victims to credential harvesting sites with URLs following a specific pattern.
The platform's built-in filtering mechanism can differentiate between bots and human visitors, redirecting victims to phishing pages while sending automated systems to benign sites.
KnowBe4 researchers have identified the platform's extensive use across 90 countries, predicting its growth due to its ability to evade URL scanning technologies.
Similar phishing services such as VoidProxy and Darcula have gained traction, but robust URL filtering and account monitoring tools are recommended to mitigate these threats.
Organizations are advised to enhance their cybersecurity measures to detect and prevent phishing attempts, safeguarding sensitive user credentials from compromise.