Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Email Security

Open Redirect Flaws in American Express and Snapchat Exploited in Phishing Attacks

Open redirect vulnerabilities affecting American Express and Snapchat websites were exploited earlier this year as part of phishing campaigns targeting Microsoft 365 users, email security firm Inky reports.

Open redirect vulnerabilities affecting American Express and Snapchat websites were exploited earlier this year as part of phishing campaigns targeting Microsoft 365 users, email security firm Inky reports.

Open redirect flaws exist because the impacted website does not validate user input, which allows threat actors to manipulate URLs to redirect users to malicious sites.

Because the manipulated link contains a legitimate domain name, the user might consider the link safe. However, the trusted domain is only used as a landing page.

From mid-May to late July, Inky observed roughly 7,000 phishing emails that originated from various hijacked accounts and which attempted to exploit the open redirect in snapchat[.]com.

Over the course of two days at the end of July, roughly 2,000 phishing emails attempted to exploit the americanexpress[.]com open redirect vulnerability.

“In both the Snapchat and the American Express exploits, the black hats inserted personally identifiable information (PII) into the URL so that the malicious landing pages could be customized on the fly for the individual victims,” Inky says.

In both cases, the attackers encoded the insertions to make them look as random characters and prevent victims from reverse engineering the PII strings.

The phishing emails in the Snapchat campaign impersonated DocuSign, FedEx, and Microsoft, but all were designed to redirect victims to websites meant to harvest the credentials of Microsoft 365 users.

The open redirect vulnerability was reported to Snapchat on August 4, 2021, but has remained unpatched.

As part of the American Express campaign, newly created domains were used to send phishing emails that redirected victims to Microsoft credential harvesting sites. The vulnerability was patched fast and the phishing links no longer work.

Inky points out that certain elements in the URL may indicate potential redirection attempts, including ‘url=’, ‘redirect=’, ‘external-link’, ‘proxy’, or multiple occurrences of ‘http’.

“Domain owners can prevent this abuse by avoiding the implementation of redirection in the site architecture. If the redirection is necessary for commercial reasons, then implementing an allow-list of approved safe links prevents bad actors from inputting malicious links,” Inky notes.

Related: Microsoft: 10,000 Organizations Targeted in Large-Scale Phishing Campaign

Related: Phishers Add Chatbot to the Phishing Lure

Related: Google Blocks Chinese Phishing Campaign Targeting U.S. Government

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Phishing

The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even...

Nation-State

The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...