Byte-Sized Brief
- New phishing tool targets Microsoft 365 accounts.
- 76 percent of attacks detected in the US since August.
- Phishing emails redirect through a system of fake links.
A phishing platform called Quantum Route Redirect is making it easier for criminals to steal Microsoft 365 users’ logins by automating nearly every step of the attack. Discovered by KnowBe4 researchers, the kit lets users launch credential theft campaigns using prebuilt phishing domains and traffic routing tools. It hides from security scanners by sending bots to safe websites while directing real users to fake login pages that then capture their usernames and passwords.
“DocuSign” email used in Quantum Route Redirect phishing campaign.
KnowBe4, Inc.
Most attacks are hitting users in the US, though the campaign has spread across 90 countries since it first appeared in August. The system’s popularity comes from how well it evades standard email security layers and URL filters. Analysts warn that phishing activity could increase as more cybercriminals gain access to tools like this.
To protect yourself, keep an eye out for these things in your email: suspicious DocuSign messages, QR codes, notices about missed voicemails, or links that look off. As a general rule, always avoid clicking strange links and confirm any unexpected messages with the sender. For your online accounts, ensure two-factor authentication is enabled, and monitor them for unusual logins.
The Bottom Line
A new tool is making online scams easier to pull off and puts email users at risk for having their login information stolen. Stay cautious by noticing unexpected emails and hesitating to click links.
Thanks for letting us know!
Subscribe
Tell us why!
Other
Not enough details
Hard to understand

