Hackers Abuse Legitimate Email Marketing Platforms to Disguise Malicious Links

Hackers Abuse Legitimate Email Marketing Platforms to Disguise Malicious Links

Cybercriminals are increasingly exploiting legitimate email marketing platforms to launch sophisticated phishing campaigns, leveraging the trusted reputation of these services to bypass security filters and deceive victims.

This emerging threat vector represents a significant evolution in phishing tactics, where attackers abuse click-tracking domains and URL redirection services provided by established email marketing companies to mask their malicious intentions.

The campaigns utilize platforms such as Klaviyo’s ‘klclick3.com’ and Drip Global’s ‘dripemail2.com’ domains, which are legitimate click-tracking services designed to monitor user interactions with marketing emails.

Google News

By routing malicious URLs through these trusted domains, attackers create a veneer of legitimacy that helps their phishing emails evade detection by traditional security systems.

The technique is particularly insidious because it exploits the inherent trust users place in recognized marketing platforms.

Recent analysis reveals that these campaigns often employ sophisticated lures, including fake voicemail notifications, DocuSign document requests, and payment-related messages.

Hackers Abuse Legitimate Email Marketing Platforms to Disguise Malicious Links
Phishing email sample that uses voicemail as a lure (Source – Trustwave)

The attackers demonstrate remarkable adaptability, combining traditional phishing techniques with modern evasion methods including CAPTCHA verification, compromised domains, and abuse of cloud services like Amazon Web Services and Cloudflare.

Trustwave researchers identified a significant increase in phishing URLs containing familiar patterns and similar phishing templates, noting the resurgence in abuse of email marketing platforms alongside widespread use of URL redirectors.

Their PageML system, which combines machine learning components with URL intelligence frameworks, has been instrumental in detecting these evolving threats in real-time.

Advanced Redirection and Evasion Techniques

The technical sophistication of these campaigns is evident in their multi-layered redirection mechanisms.

In one documented case, attackers used a Base64-encoded redirection scheme where the initial phishing URL contained encoded strings that, when decoded, revealed the actual malicious destination.

Hackers Abuse Legitimate Email Marketing Platforms to Disguise Malicious Links
Phishing email sample that also contains a fake remittance image (Source – Trustwave)

The source code analysis showed:-

ucis.RedirectUrl = "aHR0cHM6Ly9vZmZpY21hc2RpbmRvbW1qZW9haWV1bnQuZXN6a3FlaHJoeXpkdXF2d3JiZ3h1dWd4YXF1bXJtLmlwLWRkbnMuY29tL2YvNFNTd08yUU5LQ3B5MWdDeEtzX0w=";
ucis.RedirectUrl = atob(ucis.RedirectUrl); // decode to real URL

Additionally, attackers implement anti-analysis measures by disabling right-click functionality through JavaScript event listeners:-

addEventListener("contextmenu", function(e) {
    e.preventDefault();
});

The campaigns also employ chameleon phishing techniques, dynamically fetching company information and logos using services like Clearbit to create personalized phishing pages that appear legitimate to specific victims.

These pages often integrate Cloudflare Turnstile for human verification, adding another layer of evasion while appearing to provide security measures.

Hackers Abuse Legitimate Email Marketing Platforms to Disguise Malicious Links
Human verification CAPTCHA (Source – Trustwave)

The abuse of legitimate infrastructure creates significant challenges for cybersecurity teams, as traditional blacklisting approaches become ineffective when malicious content is hosted on trusted domains.

This trend underscores the need for advanced behavioral analysis and machine learning-based detection systems capable of identifying malicious intent regardless of the hosting infrastructure’s reputation.

Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.