Phishers Weaponize Safe Links With Multi-Layered URLs to Evade Detection

Related

Amazon SES Increasingly Abused in Phishing to Evade Detection

What happened Threat actors are exploiting Amazon Simple Email Service...

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

What happened Microsoft has revised its advisory for CVE-2026-32202, a...

Robinhood Account Creation Flaw Abused to Send Phishing Emails

What happened Threat actors exploited a flaw in Robinhood's account...

NASA Employees Duped in Chinese Phishing Scheme Targeting Defense Software

What happened NASA's Office of Inspector General has released details...

Share

What happened

Researchers from Level2 Analysts identified a phishing technique that abuses Microsoft Safe Links by embedding malicious destinations inside multi-layered URLs to evade detection. Attackers craft emails containing Safe Links that appear legitimate but redirect users through multiple encoded layers before reaching phishing pages. These layered URLs are designed to bypass security filters and make analysis more difficult, as each redirection step obscures the final destination. The campaign relies on trusted security infrastructure to increase credibility, with victims more likely to click links that appear to be scanned and approved. Researchers noted that the use of Safe Links in this way complicates traditional detection methods that rely on static URL analysis.

Who is affected

Email users and organizations relying on Microsoft Safe Links protection are affected, particularly those who may trust links that appear to be validated by built-in security tools.

Why CISOs should care

The technique shows how attackers can exploit trusted security mechanisms to bypass detection and increase phishing success rates by embedding malicious content within layered redirection chains.

3 practical actions

  1. Inspect multi-layered URL redirections. Analyze full redirect chains instead of relying on initial link appearance.
  2. Enhance phishing detection controls. Implement tools capable of dynamic URL analysis across multiple layers.
  3. Educate users on trusted-link abuse. Reinforce that security-labeled links can still lead to malicious destinations.

For more coverage of email-based threats and social engineering campaigns, explore our reporting on Phishing.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts