Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters

Hackers Exploit Cisco Secure Links to Evade Scanners and Bypass Filters

Cybercriminals have discovered a sophisticated new attack vector that weaponizes Cisco’s security infrastructure against users, according to recent research from Raven AI.

The company’s context-aware detection systems uncovered a credential phishing campaign that exploits Cisco Safe Links to evade traditional email security scanners and bypass network filters, highlighting a dangerous trend of attackers turning trusted security tools into weapons.

The Trust Exploitation Mechanism

The attack leverages a fundamental weakness in human psychology and automated security systems: trust by association.

When users encounter URLs beginning with “secure-web.cisco.com,” they instinctively assume the links have been vetted and approved by Cisco’s security infrastructure.

You receive an email with a link that starts with “secure-web.cisco.com” Your brain immediately registers “secure” and “Cisco” 

This trust extends to automated security systems, which often allow Cisco-branded domains to pass through filters without rigorous scrutiny.

Cisco Safe Links, part of the company’s Secure Email Gateway and Web Security suite, functions by rewriting suspicious URLs in emails and routing clicks through Cisco’s threat analysis infrastructure before directing users to their intended destinations.

While this technology has prevented countless phishing attacks, cybercriminals have now learned to exploit the very mechanism designed to protect users.

Security researchers have identified four primary methods attackers use to generate legitimate Cisco Safe Links for malicious purposes.

Raven AI Catches the Attack in Action
Raven AI Catches the Attack in Action

The most common approach involves compromising accounts within Cisco-protected organizations, where attackers email malicious links to themselves and harvest the automatically generated Safe Links.

Alternative methods include exploiting SaaS services that send emails through Cisco-protected environments and recycling active Safe Links from previous campaigns.

Raven AI’s context-aware detection systems recently identified a sophisticated example of this attack technique in action.

The phishing campaign masqueraded as a “Document Review Request” from an e-signature service, complete with professional branding and business terminology.

Unlike traditional security solutions that might focus solely on domain reputation, Raven’s AI identified contextual anomalies in the business process workflow and suspicious URL structures with encoded parameters.

Conventional email security solutions struggle with these attacks because they appear legitimate at every technical level.

The malicious elements are hidden in context and behavior rather than in obvious technical indicators.

Many security gateways focus their analysis on visible domains in URLs, allowing cisco.com domains to bypass detection systems that would flag other suspicious links.

This attack methodology represents a fundamental shift in cybersecurity threats, where attackers exploit trust relationships and legitimate business processes rather than purely technical vulnerabilities.

Traditional signature-based and reputation-based security solutions prove inadequate against attacks that look professional and use trusted infrastructure.

The incident underscores the growing importance of context-aware AI in email security, which analyzes not just the technical components of communications but also their behavioral patterns and business process appropriateness.

As attackers continue evolving their techniques to exploit trusted security infrastructure, organizations must adapt their defenses to understand attacker intent rather than simply blocking known bad actors.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.