Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I Didn’t Know This 5-Minute Bedtime Task Would Help Me Sleep Better

    August 8, 2025

    21 Best Festival Accessories and Gear (2025): The Essentials and the Fun Stuff

    August 8, 2025

    Panasonic ShinobiPro MiniLED TVs Launched in India Alongside New 2025 P-Series Models

    August 8, 2025
    Facebook X (Twitter) Instagram
    Trending
    • I Didn’t Know This 5-Minute Bedtime Task Would Help Me Sleep Better
    • 21 Best Festival Accessories and Gear (2025): The Essentials and the Fun Stuff
    • Panasonic ShinobiPro MiniLED TVs Launched in India Alongside New 2025 P-Series Models
    • Ready or Not Regains Flagship Xbox Feature, Play Anywhere
    • Here’s how I stop spam emails from ever reaching my inbox
    • Breath Work, Biohacking, and Cryotherapy: New Buzzwords for Modern Business Travelers
    • Apple Must Allow Alternative Browser Engines on iOS by December Under Japan’s New Mobile Software Competition Act
    • Samsung Galaxy Buds 3 Series Update Adds Google Gemini Support on Phones Running One UI 8
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»Gaming»Hackers are using link wrapping to steal your Microsoft 365 login
    Gaming

    Hackers are using link wrapping to steal your Microsoft 365 login

    techupdateadminBy techupdateadminAugust 5, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Hacker vor Computer
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Cloudflare‘s email security team recently uncovered a new phishing technique. Attackers are using compromised email accounts to disguise malicious links via legitimate link wrapping services. Services like those from Proofpoint or Intermedia rewrite incoming links to trustworthy domains and scan them automatically, a protection mechanism that, in this case, becomes a gateway.

    The links look deceptively genuine

    The attackers shorten their links using URL shorteners and send them via hacked accounts. The security solutions provide the links with a “secure” domain, which makes them appear legitimate. But behind the URLs lurk phishing pages that deceptively mimic Microsoft 365 login pages. Subject lines such as “New voicemail,” “Secure document for retrieval,” or “New message in Microsoft Teams” are designed to lure unsuspecting users. Some emails even pose as encrypted “Zix” messages, a well-known system for secure communication.

    Clicking on seemingly harmless buttons like “Reply” leads directly to fake login pages designed to steal credentials. According to Cloudflare, attackers use the trustworthiness of the rewritten links to bypass security filters. Such methods are not new. Services like Google Drive have already been similarly abused, but the targeted exploitation of link wrapping is a new chapter in the phishing playbook.

    Cloudflare writes about this in its report:

    Link wrapping is used by providers such as Proofpoint to protect users. This involves routing all clicked URLs through a scanning service so that known malicious targets can be blocked at the time of the click. […] This defense method is quite effective against known threats. However, attacks can still be successful if the wrapped link has not yet been flagged as dangerous by the scanner at the time of click.

    Companies need to rethink security

    This is a wake-up call for users and organizations: automatic detection of malicious links isn’t enough anymore. IT admins should update firewalls and email filters, step up employee training, and require multi-factor authentication for Microsoft 365 accounts. These attacks highlight how easily cybercriminals can turn protective tools into vulnerabilities.

    This article originally appeared on our sister publication PC-WELT and was translated and localized from German.

    Hackers Link login Microsoft Steal wrapping
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhich iPhones Can Run iOS 26? See the Entire List of Compatible Devices
    Next Article Best Cheap Laptop for 2025 – Budget Computers Under $500
    techupdateadmin
    • Website

    Related Posts

    Gaming

    This PC security guru fell for a scam. Here are 3 lessons from his mistake

    August 8, 2025
    Gaming

    The Song of the Summer Is Dead

    August 8, 2025
    Gaming

    AT&T’s Massive Privacy Settlement Could Pay Customers Up to $7,500

    August 8, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Apple Pencil With ‘Trackball’ Tip, Ability to Draw on Any Surface Described in Patent Document

    July 9, 20253 Views

    Samsung Galaxy Z Fold 7 and Galaxy Z Flip 7: First Impressions

    July 9, 20253 Views

    The Bezos-funded climate satellite is lost in space

    July 9, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    I Didn’t Know This 5-Minute Bedtime Task Would Help Me Sleep Better

    August 8, 2025

    21 Best Festival Accessories and Gear (2025): The Essentials and the Fun Stuff

    August 8, 2025

    Panasonic ShinobiPro MiniLED TVs Launched in India Alongside New 2025 P-Series Models

    August 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2025 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.