🚀 CloudSEK has raised $19M Series B1 Round – Powering the Future of Predictive Cybersecurity
Back
This is some text inside of a div block.
Adversary Intelligence

Cybercriminals Exploit Reverse Tunnel Services and URL Shorteners to Launch Large-Scale Phishing Campaigns

06 Jun 22
This is some text inside of a div block.
min

Fill Details to Download

Thank You!

Your whitepaper is now downloading...
Oops! Something went wrong while submitting the form.

CloudSEK's contextual AI digital risk platform XVigil has identified a surge in phishing sites hosted using reverse tunnel services. In this report, we delve into how threat actors use reverse tunnel services, along with URL shorteners, to orchestrate widespread campaigns, without leaving any traces.

Threat Actors Can Now Launch Untraceable Phishing Campaigns

Reverse tunnel services usher in a new era of phishing by making it easier for threat actors to stay under the radar.

  • Threat actors can host phishing pages from their local machine and generate URLs with random names that cannot be detected by regular domain name scanning services.
  • URL shorteners to further obfuscate the random domain names and evade detection.
  • Since the URLs stay live only for 24 hours, it becomes difficult to track groups and their activities.
  • There are no policies that mandate the service providers to monitor or takedown malicious URLs.

‍

No items found.

Fill Details to Download

Thank You!

Your whitepaper is now downloading...
Oops! Something went wrong while submitting the form.