Phishers Weaponize Safe Links With Multi-Layered URLs to Evade Detection

Related

CISOs to Watch in Georgia’s Financial Services Sector

Georgia’s financial services sector includes banks, wealth management firms,...

ScreenConnect Vulnerability Exposes Machine Keys, Enables Session Hijacking

What happened ConnectWise disclosed a critical vulnerability in its ScreenConnect...

RondoDox Botnet Targets 174 Vulnerabilities Across Devices and Platforms

What happened Researchers at Bitsight identified a large-scale campaign involving...

11 Cybersecurity Vendors CISOs Must Check Out at RSA Conference 2026

Cybersecurity has shifted from reactive defense to continuous, intelligence-driven...

Share

What happened

Researchers from Level2 Analysts identified a phishing technique that abuses Microsoft Safe Links by embedding malicious destinations inside multi-layered URLs to evade detection. Attackers craft emails containing Safe Links that appear legitimate but redirect users through multiple encoded layers before reaching phishing pages. These layered URLs are designed to bypass security filters and make analysis more difficult, as each redirection step obscures the final destination. The campaign relies on trusted security infrastructure to increase credibility, with victims more likely to click links that appear to be scanned and approved. Researchers noted that the use of Safe Links in this way complicates traditional detection methods that rely on static URL analysis.

Who is affected

Email users and organizations relying on Microsoft Safe Links protection are affected, particularly those who may trust links that appear to be validated by built-in security tools.

Why CISOs should care

The technique shows how attackers can exploit trusted security mechanisms to bypass detection and increase phishing success rates by embedding malicious content within layered redirection chains.

3 practical actions

  1. Inspect multi-layered URL redirections. Analyze full redirect chains instead of relying on initial link appearance.
  2. Enhance phishing detection controls. Implement tools capable of dynamic URL analysis across multiple layers.
  3. Educate users on trusted-link abuse. Reinforce that security-labeled links can still lead to malicious destinations.

For more coverage of email-based threats and social engineering campaigns, explore our reporting on Phishing.