Original Article Text

Click to Toggle View

Attackers exploit link-wrapping services to steal Microsoft 365 logins. A threat actor has been abusing link wrapping services from reputed technology companies to mask malicious links leading to Microsoft 365 phishing pages that collect login credentials. The attacker exploited the URL security feature from cybersecurity company Proofpoint and cloud communications firm Intermedia in campaigns from June through July. Some email security services include a link wrapping feature that rewrites the URLs in the message to a trusted domain and passes them through a scanning server designed to block malicious destinations. Legitimizing phishing URLs Cloudflare’s Email Security team discovered that the adversary legitimized the malicious URLs after compromising Proofpoint and Intermedia-protected email accounts, and likely used their unauthorized access to distribute the “laundered” links. “Attackers abused Proofpoint link wrapping in a variety of ways, including multi-tiered redirect abuse with URL shorteners via compromised accounts,” the researchers said. "The Intermedia link wrapping abuse we observed also focused on gaining unauthorized access to email accounts protected by link wrapping“ - Cloudflare Email Security The threat actor added an obfuscation layer by first shortening the malicious link before sending it from a protected account, which automatically wrapped the link. The researchers say that the attacker lured victims with fake notifications for voicemail or shared Microsoft Teams documents. At the end of the redirect chain was a Microsoft Office 365 phishing page that collected credentials. In the campaign that abused Intermedia’s service, the threat actor delivered emails pretending to be a “Zix” secure message notification for a viewing a secure document, or impersonated a communication from Microsoft Teams informing of a newly received message. The link allegedly leading to the document was a URL wrapped by Intermedia’s service and redirected to a fake page from digital and email marketing platform Constant Contact hosting the phishing page. Clicking on the reply button in the fake Teams notification led to a Microsoft phishing page that would collect login credentials. By disguising the malicious destinations with legitimate email protection URLs, the threat actor increased the chances of a successful attack, the Cloudflare researchers said. It should be noted that abusing legitimate services to deliver malicious payloads is not new but exploiting the link-wrapping security feature is a recent development on the phishing scene. Red Report 2025: Analyzing the Top ATT&CK Techniques Used by 93% of Malware Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systems. Discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

CYBERCRIME // Cybercriminals Exploit Link-Wrapping Services to Hijack Microsoft 365 Logins

A threat actor exploited link-wrapping services from Proofpoint and Intermedia to mask phishing links targeting Microsoft 365 credentials.

These services typically rewrite URLs in emails to a trusted domain and scan them for malicious activity, which in this case was circumvented.

By compromising protected email accounts, the attacker used these trusted services to legitimize and distribute phishing URLs.

The phishing campaigns featured fake notifications from Microsoft Teams and voicemails to lure victims into clicking malicious links.

The final destination of these links was a Microsoft Office 365 phishing page designed to capture user credentials.

In one specific instance, the attacker impersonated a secure message notification, which led to a phishing page hosted by Constant Contact.

Cloudflare's Email Security team identified these activities, noting the sophisticated use of multi-tiered redirect abuse and URL shortening to obfuscate the attack chain.

This approach not only increases the credibility of phishing attempts but also highlights a novel misuse of security features designed to protect users.