Edward Kiledjian's Threat Intel

Phishing with Proofpoint: Cyber attack disguises itself as a security link

Cybercriminals are using Proofpoint’s link wrapping system to carry out targeted phishing attacks. The attackers exploit Proofpoint’s protection to make fraudulent URLs appear credible, using compromised email accounts and multi-level detours to disguise the actual target.