Attackers Use Quantum Route Redirect to Launch Instant Phishing on M365

Attackers Use Quantum Route Redirect to Launch Instant Phishing on M365

KnowBe4 Threat Labs has uncovered a sophisticated phishing campaign that marks a turning point in cybercriminal capabilities. The threat landscape is shifting dramatically with the emergence of Quantum Route Redirect.

This powerful automation tool transforms complex phishing operations into simple, streamlined attacks accessible to even less-skilled threat actors.

Discovered in early August, Quantum Route Redirect represents a new breed of phishing-as-a-service platform that fundamentally changes how cybercriminals operate.

Instead of requiring technical expertise to coordinate campaigns, deploy infrastructure, and manage victim tracking, this pre-configured kit democratizes credential theft attacks by automating the entire process.

Admin login page for Quantum Route Redirect instance.
Admin login page for Quantum Route Redirect instance.

With approximately 1,000 domains currently hosting the tool, the scale of this threat is already substantial and growing.

How the Attack Works

Quantum Route Redirect campaigns begin with familiar phishing tactics emails impersonating DocuSign, payroll departments, payment notifications, or even HR teams.

The platform automates browser fingerprinting and VPN/proxy detection, which enables it to determine when it’s a security tool checking a link versus when it’s a real user.

Quantum Route Redirect system dashboard.Quantum Route Redirect system dashboard.
Quantum Route Redirect system dashboard.

These messages frequently include QR codes pointing to phishing pages (quishing attacks). What makes this tool different is what happens behind the scenes: an intelligent traffic-routing system that identifies whether a link visitor is a security scanner or a genuine user.

When security tools scan the malicious links, they’re silently redirected to legitimate websites, making the email appear harmless and allowing it to bypass URL scanning detection.

Real users who click the links, however, are directed to credential-harvesting pages where their Microsoft 365 credentials are stolen.

This automatic differentiation between bots and humans enables the tool to evade multiple layers of corporate security: Microsoft Exchange Online Protection, secure email gateways, and integrated cloud email security systems.

The technical sophistication lies in browser fingerprinting, VPN detection, and behavioral analysis that classify incoming traffic in milliseconds.

Attackers access an intuitive admin dashboard to configure redirect rules, view real-time campaign analytics, and monitor success metrics across all compromised victims.

Global Scale and Impact

The campaign’s reach is staggering. Victims have been compromised across 90 countries, with the United States accounting for 76% of affected users.

Distribution of Quantum Route Redirect Attack Targets.Distribution of Quantum Route Redirect Attack Targets.
Distribution of Quantum Route Redirect Attack Targets.
Map of Quantum Route Redirect Attack Targets.Map of Quantum Route Redirect Attack Targets.
Map of Quantum Route Redirect Attack Targets.

The remaining 24% spans the globe, demonstrating the international scope of this threat. This geographic distribution suggests that Quantum Route Redirect operators are casting a vast net with their phishing campaigns.

Organizations cannot rely solely on URL scanning defenses anymore. A multi-layered approach is essential. Integrated cloud email security products using natural language processing to analyze email content, combined with impersonation detection and polymorphic analysis, provide significantly better protection than traditional email gateways alone.

Beyond technical controls, Human Risk Management (HRM) platforms can identify high-risk users and deliver targeted training at critical moments.

Real phishing samples from Quantum Route Redirect campaigns can be converted into simulations, educating employees about actual threats they face.

Quantum Route Redirect isn’t disappearing it’s evolving. Upcoming versions will include QR code generation capabilities to scale quishing attacks further.

As this technology becomes more entrenched, cybersecurity teams must adopt adaptive defenses combining advanced email security, behavioral analytics, account compromise detection, and continuous user awareness training to stay ahead of an increasingly democratized threat landscape.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link