Spearphishing Link
Adversaries may send spearphishing messages with a malicious link to elicit sensitive information that can be used during targeting. Spearphishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. The malicious emails contain links to clone login portals, credential harvesting sites, or adversary-in-the-middle (AiTM) proxy infrastructure such as EvilProxy and Evilginx2. Attackers may also use QR codes (quishing) to bypass email URL scanners, embed tracking pixels and web beacons to verify email delivery and profile victims (IP address, email client, OS), or conduct browser-in-the-browser (BitB) attacks that display fake browser popups mimicking legitimate login pages. URL obfuscation techniques include using the @ symbol (http://[email protected] routes to malicious.com), integer- or hex-encoded hostnames, and URL shorteners to bypass static block lists. Groups including APT28, Kimsuky, Sidewinder, Scattered Spider, Silent Librarian, and Sandworm Team are known to use this technique extensively for credential harvesting before initial access.
let SuspiciousUrlKeywords = dynamic([
"login", "signin", "secure", "verify", "account", "update",
"portal", "password", "credential", "auth", "oauth", "sso",
"microsoft", "office365", "outlook", "sharepoint", "onedrive",
"google", "dropbox", "docusign", "adobe", "zoom"
]);
let UrlShorteners = dynamic([
"bit.ly", "tinyurl.com", "t.co", "ow.ly", "goo.gl", "short.io",
"tiny.cc", "is.gd", "buff.ly", "rebrand.ly", "cutt.ly"
]);
// Detect suspicious URL clicks from emails — potential credential harvesting or spearphishing
UrlClickEvents
| where Timestamp > ago(24h)
| where ActionType in ("ClickAllowed", "ClickBlocked")
| extend IsUrlShortener = UrlDomain has_any (UrlShorteners)
| extend HasCredentialKeyword = Url has_any (SuspiciousUrlKeywords)
| extend IsIPBasedUrl = UrlDomain matches regex @"^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$"
| extend IsObfuscatedUrl = Url contains "@" and (Url startswith "http://" or Url startswith "https://")
| extend IsHexOrIntegerHost = UrlDomain matches regex @"^0[xX][0-9a-fA-F]+$|^\d{8,10}$"
| extend SuspicionScore = toint(IsUrlShortener) + toint(HasCredentialKeyword) + toint(IsIPBasedUrl) + toint(IsObfuscatedUrl) + toint(IsHexOrIntegerHost)
| where SuspicionScore >= 1 or ActionType == "ClickBlocked"
| join kind=leftouter (
EmailEvents
| where Timestamp > ago(24h)
| project NetworkMessageId, SenderFromAddress, SenderMailFromDomain, Subject, EmailDirection
) on NetworkMessageId
| project Timestamp, AccountUpn, SenderFromAddress, SenderMailFromDomain, Subject, Url, UrlDomain,
ActionType, IsUrlShortener, HasCredentialKeyword, IsIPBasedUrl, IsObfuscatedUrl,
IsHexOrIntegerHost, SuspicionScore
| sort by Timestamp desc Data Sources
Required Tables
False Positives
- Marketing emails from legitimate vendors using URL shorteners (bit.ly, ow.ly) and click-tracking redirectors for engagement analytics
- Internal security awareness training phishing simulations from platforms such as KnowBe4, Proofpoint Security Awareness Training, or Cofense
- Legitimate SaaS vendor password reset or onboarding emails containing 'login', 'verify', or 'account' keywords in URLs
- Corporate newsletter or HR communication services using URL redirection for open and click tracking
- Automated IT system notifications (Azure AD access reviews, Okta account alerts) containing authentication-related URL keywords
References (12)
- https://attack.mitre.org/techniques/T1598/003/
- https://www.trendmicro.com/en_us/research/20/i/tricky-forms-of-phishing.html
- https://mrd0x.com/browser-in-the-browser-phishing-attack/
- https://www.mandiant.com/resources/blog/url-obfuscation-schema-abuse
- https://csrc.nist.gov/glossary/term/web_bug
- https://en.ryte.com/wiki/Tracking_Pixel/
- https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-human-factor-report.pdf
- https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/safe-links-about
- https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-phishing-protection-about
- https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/attack-simulation-training-get-started
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1598.003/T1598.003.md
- https://www.zscaler.com/blogs/security-research/fake-sites-stealing-steam-credentials
Unlock Pro Content
Get the full detection package for T1598.003 including response playbook, investigation guide, and atomic red team tests.