During the recent few months, there has been a serious exploitation of URL rewriting, a new method that protect the users by replacing links in emails. Hackers have discovered new ways to exploit email URL rewriting features that has raised alarms among security experts. This has proven to be turned out into a vulnerability from a protective measure.
Attackers manipulate these rewritten URLs, to execute highly evasive phishing links behind trusted domains of security vendors by bypassing detection effectively. This has raised a critical surge in advanced phishing attacks that leverage the very tools developed to prevent them.
Generally, the threat actors seek the most effective methods to deliver their malicious links through email messages. We have witnessed many such tactics such as QR code phishing, and two-step delivery methods that impersonate malicious links behind legitimate services such as Canva or Office Forms.
To get an understanding of how the threat actors abuse the features of URL rewriting, let us break down what "URL rewriting" actually is.
What is URL Rewriting?
URL rewriting is a security feature employed by email security vendors to protect the users from malicious links embedded in emails. It is known by different names such as URL protection, click-time protection, etc. URL rewriting serves a single goal, i.e., to protect the users from malicious links.
The process involves replacing original URLs with modified links that direct the recipient first to vendor's servers. On that place, the links are scanned for threats when clicked- then the recipient can access it and is redirected to the web content, if not it will get blocked.
Types of URL Rewriting
There are two main models for URL Rewriting:
- Legacy security solutions- It relies on rules and signatures that are based on previously identified threats. They rewrite URLs which they can assess later, leveraging updated threat intelligence and their broad visibility to email traffic. This approach allows them to block a site if new information becomes available. It occurs after an initial victim has already been hit and reported back to them.
- Proactive solutions- This is a newer approach to URL rewriting that scans links at the time of the click with the use of technologies like computer vision and machine learning algorithms. Unlike legacy systems, these solutions not only rely on known malicious attacks or threat intelligence databases, but also evaluate the URL's behavior in real-time.
How attackers exploit URL Rewriting?
- Compromising Email Accounts- This is the most probable tactic that includes compromising legitimate email accounts that are protected by URL rewriting features. Generally, the attackers send an email to themselves that contain a "clear-later-to-be-phishing" URL. Once the email passes through the URL protection service, the link is rewritten including the email security vendor's name and domain that gives an extra layer of legitimacy.
- Whitelisting Exploitation- There are some email security services that whitelist their dedicated rewriting domains, which is exploited by the attackers. Once a rewritten URL is whitelisted, the attackers can modify the destination to redirect users to a phishing site, bypassing further security checks.
Real-world examples of URL Rewriting exploits
Preventive Measures for URL Rewriting Abuse
- Proactive Detection- Scanning and evaluating URLs in real-time prevents attacks from entering the inbox. This help to protect against threats that exploit the gaps left by URL rewriting.
- Advanced Anti-Evasion- This measure is equipped to reverse the evasion techniques such as CAPTCHA and geo-fencing. This ensures that even the most cunningly disguised threats got detected and blocked.
- Post-Delivery and Meta Analysis- The unique XDR-like infrastructure leverages big data to autonomously rescan and reassess links after delivery. This update verdicts and catch threats that evolve post-delivery.
- Advanced Browser Security- Most platforms offer advanced browser security extensions that scans URLs upon click from the target's point of view. This ensures that any suspicious and malicious activity is detected in real-time.

.png)
Comments
Post a Comment