Thursday, September 11, 2025
HomeCyber SecurityRisk Actors Ramp Up Use of Encoded URLs to Bypass Safe E...

Risk Actors Ramp Up Use of Encoded URLs to Bypass Safe E mail


Safe e mail gateways (SEG) do so much to guard organizations from malware, spam, and phishing e mail. For some risk actors although, additionally they supply a pretty choice for sneaking malicious mail previous different SEGs.

Safety researchers from Cofense this week reported observing a latest surge in assaults, the place risk actors have used SEGs to encode or to rewrite malicious URLs embedded of their emails to potential victims. In lots of instances, when the emails arrived at their vacation spot, SEGs allowed the malicious URLs to undergo with out correctly vetting the hyperlink.

The SEG Versus SEG Risk

The explanation, says Max Gannon, risk intelligence supervisor at Cofense, is that some safe e mail gateway merchandise seem to not be dealing with SEG-encoded URLs correctly and assume them to be all the time protected, when in actuality they aren’t.

“We do not need entry to the internals of SEGs, so I can not say for sure,” Gannon says. “However they doubtless both implicitly belief the URLs or they try and scan them, however the area of the SEG that encodes the URL is trusted, so the [receiving] SEG assumes the URL itself is respectable.”

In SEG encoding, a safe e mail gateway product primarily rewrites each URL in an outgoing e mail right into a hyperlink that factors to its personal infrastructure. When a recipient clicks on the encoded hyperlink, the person is first directed to the sender’s SEG system, which checks if the URL is protected earlier than redirecting the person to the meant vacation spot. The checks normally contain assessing the URL utilizing popularity, blacklists, signatures, and different mechanisms, which suggests typically it’d take an SEG days and even weeks earlier than it designates a URL as malicious.

In these conditions, issues can come up if the recipient’s safe e mail gateway know-how doesn’t acknowledge an already encoded URL as needing scanning, or if the recipient’s SEG scans the URL, however solely sees the sending e mail gateway’s area and never the ultimate vacation spot.

“Oftentimes when SEGs detect URLs in emails which can be already SEG-encoded they don’t scan the URLs, or the scanning exhibits solely the safety instrument’s scanning web page and never the precise vacation spot,” Cofense wrote in its report this week. “Consequently, when an e mail already has SEG-encoded URLs, the recipient’s SEG usually permits the e-mail via with out correctly checking the embedded URLs.”

A Substantial Improve

Attackers have abused SEG encoding beforehand to sneak malicious emails into goal environments. However there was a considerable enhance in use of the tactic within the second quarter of this 12 months, Might particularly. Cofense mentioned.

Based on the safety vendor, the 4 e mail safety gateways that risk actors have abused essentially the most to encode URLs and sneak them previous e mail protection mechanisms are VIPRE E mail Safety, Bitdefender LinkScan, Hornet Safety Superior Risk Safety URL Rewriting, and Barracuda E mail Gateway Protection Hyperlink Safety.

Cofense mentioned its researchers had noticed attackers utilizing these SEGs to encode malicious URLs in variously themed campaigns focused at customers protected by SEGs from a wide range of distributors.

Gannon says some SEG encodings would require the risk actor to run their URL via the SEG. “Different encodings like Barracuda Hyperlink Shield would allow you to merely prepend their URL to the malicious URL you are attempting to bypass with,” he says. “For instance, to make use of Barracuda Hyperlink Shield to bypass SEGs with the URL hxxp[:]//badplace[.]com/, I’d merely add the Barracuda Hyperlink Shield URL and make it: hxxps://linkprotect[.]cudasvc[.]com/url?a=hxxp[:]//badplace[.]com/.”

Gannon says one motive why risk actors doubtless aren’t utilizing the tactic on a much wider scale is as a result of it includes extra work. “The largest factor it comes right down to is effort,” he says. If a risk actor can take an hour to encode all of the URLs in a marketing campaign and attain 500 extra inboxes, they might take the identical hour and simply discover a further 1,000 e mail addresses to ship the marketing campaign to.”

Defending towards the tactic may be comparatively troublesome, as most SEGs haven’t got tuning strategies for ignoring different SEG encodings, Gannon says. Subsequently, one of the simplest ways to fight the tactic stays person consciousness and coaching. “A vigilant and knowledgeable worker is just not going to click on a hyperlink in a suspect e mail, even when the URL is encoded by a SEG.”



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments