Impersonation is one of the most common and reliable tactics of any hacker. It naturally causes victims to lower their guard and overlook the subtle and not-so-subtle signs of malice. But how hackers go about impersonating legitimate entities—whether people or businesses—varies significantly. Numerous techniques exist to accomplish this feat—and among them is the practice of abusing an open redirect. Vade continues to see this technique used commonly in phishing scams that abuse legitimate brands and services.
In this blog post, we break down what an open redirect attack is, how it works, why hackers use it, and how you can protect against it.
Redirects are a necessary part of the Internet, used to tell a browser to automatically browse another website or visit another URL. It’s extremely common, used for situations such as redirecting a site from an insecure HTTP version to a more secure HTTPS. When done securely, these redirections happen from within the web application and can be controlled or secured by the site owners.
An open redirect is when a redirected URL can be set from outside the application or can otherwise be impacted by user-controlled information. On the surface, it is not inherently a bad thing (3xx redirects are technically a category of open redirects!), but they can be easily exploited. Problems arise when attackers redirect to external URLs without proper validation or sanitization. As the name suggests, an open redirect attack occurs when hackers exploit this vulnerability to redirect users to different, potentially harmful websites.
The typical process of open redirects involves the following steps:
The example below shows a legitimate webpage of Baidu, the Chinese search engine. The webpage URL originates from a phishing email that contains a link redirect. Users that click the link get sent to this page momentarily before getting redirected to a destination phishing page. By using an open redirect, hackers can hide the malicious link behind a legitimate one. They can also evade security measures that consider a domain’s reputation and age to filter threats.
By abusing a brand like Baidu, hackers can exploit the trust signals of an otherwise safe and widely used legitimate service. They can also increase the chances their phishing email ends up in the targeted user’s inbox. That explains why Vade has detected a high volume of open redirect attacks involving Baidu.
Baidu open redirect attack detected by Vade
Open redirects are leveraged by spammers looking to circumvent numerous security measures, particularly Webroot bots that identify malicious links. For spammers, trying to out-think their adversaries is crucial during large-scale phishing mass-mailing campaigns. Below is a non-exhaustive list of bots that scrutinize links, distinguishing between legitimate and malicious links before reaching the inbox:
To outsmart bots and achieve successful inbox deliverability while simultaneously evading browser-based Webroot scans, spammers resort to scripting scam pages with obfuscation techniques and setting up “fudlinks” (fully undetectable links). If an attacker lacks the web hacking skills to perform subdomain penetration testing and discover open redirects, several valid open redirect bots are available. These bots assist in making scam script links fully undetectable, allowing them to bypass fake user interactions triggered by bots and ensuring real users can access the intended target links.
To detect open redirect vulnerabilities, particularly those involving subdomains, a combination of manual testing and automated tools is typically required. The following steps can be taken to uncover such vulnerabilities:
You can protect against open redirect attacks by implementing a combination of measures. Advanced email security solutions like Vade for M365 can filter malicious emails containing open redirect links and prevent them from reaching users. Phishing awareness training can teach users to identify the signs of phishing and report suspicious emails for remediation. And other measures, such as adopting multifactor authentication (MFA) and enforcing strong password policies, can limit the risk of exploitation before or after a successful compromise.