In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first observed on January 21st, and remains ongoing, although the daily threat volume is decreasing.
Geographically, 75% of these emails have been distributed in the US, while 17% were distributed in the EMEA region, and 5% were distributed in Canada.
The cyber criminals behind this campaign aim to compromise as many organizations and individuals as possible. The hackers do not appear to target specific industries, rendering a wide spectrum of enterprises vulnerable to this threat, unless they have an advanced email security solution.
Because the operational mechanisms involved in this campaign are quite sophisticated, despite security awareness training, most email users will not be able to identify the danger. As a result, organizations are at-risk of account-based credential theft.
Cyber criminals deploy sophisticated URL manipulation techniques within standard phishing emails like fake invoices, tickets, payment receipts, renewal or account activation notices.
Example 1
Example 2
Their primary deception method exploits the “userinfo” portion of web addresses – the segment between “http://” and the “@” symbol (e.g., https://username:password@example.com).
Since most websites disregard this field, attackers can insert misleading information before the “@” symbol to disguise malicious links. To further enhance their deception, attackers may employ multiple techniques in combination:
The final payload delivers a meticulously crafted Microsoft 365 phishing page, complete with CAPTCHA implementation – a social engineering touch that exploits users’ learned trust in security mechanisms.
This sophisticated interplay of technical deception and psychological manipulation demonstrates why traditional URL inspection training is becoming increasingly inadequate against modern phishing campaigns.
Security leaders may wish to consider this campaign a warning sign regarding future attack evolution. As phishing attack techniques become more sophisticated, organizations need to shift from user-dependent security controls to more automated, AI and ML-driven threat prevention systems.
Organizations may need to rethink email authentication frameworks, potentially moving beyond SPF, DKIM and DMARC protocols alone.