Skip to main content

Phishers Use New Method to Bypass Office 365 Safe Links

  • May 8, 2018
  • 1 reply
  • 374 views

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
By Eduard Kovacs on May 08, 2018
 
Cybercriminals have been using a new method to ensure that the URLs included in their phishing emails bypass the Safe Links security feature in Office 365, cloud security company Avanan revealed on Tuesday.
 
Safe Links, offered as part of Microsoft’s Office 365 Advanced Threat Protection (ATP) solution, is designed to protect organizations against malicious links delivered through emails and documents. Safe Links checks the original URL to see if it has been blacklisted (by Microsoft or the ATP customer) or if it points to malware. If a malicious element is detected, the original link is replaced and users are alerted when they click on it.
 
Full Article.

1 reply

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
May 9, 2018  By Pierluigi Paganini
 

The baseStriker attack technique allows to bypass anti-phishing filters by splitting and disguising a malicious link using a tag called the <base> URL tag.

 
Security researchers at cloud security company Avanan have discovered a technique, dubbed baseStriker, used by threat actors in the wild to bypass the Safe Links security feature of Microsoft Office 365.
 
The Safe Links feature is designed by Microsoft to protect Office users from malicious codes and phishing attacks, it is part of Microsoft’s Advanced Threat Protection (ATP).
 
Full Article.