Detection evasion through abused redirect

Erlend Andreas Gjære | 3 July 2020

Does your website allow the forwarding of end-users to URLs provided as a user-provided URL parameter? If so, it may potentially be abused in phishing campaigns, along with your web domain reputation.

When spam filters check incoming emails, one of the common things to assess is the so-called reputation of any web domains which are linked to in the email.

As a consequance, cybercriminals are naturally looking to abuse the reputation of your legitimate web domain for their own malicious purposes. Sometimes this involves hacking your website to install their own content on your public URL, but this is not always the easiest way.

Recently, we've seen a surge in phishing attacks which take advantage of a particular kind of website functionality, namely redirects.

Redirect implementations

Redirects are used with several various implmentation for each their purposes:

Abusing redirects for phishing

Consider especially the two last examples above, which can be prone to exploitation. Since they both take a full URL as their input from the user, an attacker could equally insert their own malicious URL and embed the redirect link in a phishing email.

The following is a real example where a trusted telecom provider has been abused to forward recipients to the attacker's website. Notice how the "rd" URL parameter contains this target:

Any phishing campaign will benefit from abusing such open redirect services, making their emails much easier to deliver. A spam filter will evaluate the linkd URL, and simply find a legitimate website, since it cannot understand the nature of redirect parameters.

Protecting against abuse

Luckily, there are several ways to mitigate such attacks which abuse your infrastructure. Consider the four examples, and you will find that the first two from Microsoft implement an identifier lookup where arbitrary input cannot be provided.

The third example is commonly used in login services as shown. In these cases, it should be required that particular target domains to be flagged as safe, while any other redirect domains are denied.

The final example shows how Google try to mitigate abuse, by showing an intermediate landing page which tells the user about the redirect. Landing pages like these could very well inform the user about the risk of proceeding, but are better to avoid entirely, if possible.

It may however be that emails are already making their way beyond your spam filter, reaching the inboxes of your end users.  Our MailRisk add-in for Outlook will already warn the recipient if many such redirects are present in an email, since the likelihood of abuse is so prominent.

In any case, make sure you are aware of the presence of any redirect functionality in your company's website: Try inserting another webdomain in your redirect, and check out what happens. If an external redirect goes through, you may have a domain name reputation risk to mitigate as well.

For further reading, check out the OWASP cheat sheet   on unvalidated redirects and forwards. You could also try the Oralyzer tool   which uses automated fuzzing to detect open redirect vulnerabilities in a given URL pattern.

 


Discover how we help your end-users with suspicious emails.

Book your demo today!

See all posts →

Human security sensors ebook cover

Want to get started?

We have written a guide for you to get started with human-centered security. Access our free resource now, and learn:

  • How to nurture drivers for employee engagement
  • How to avoid common obstacles for reporting
  • Practical examples and steps to get started

Download free PDF →