URL Tracking Systems are Abused for Phishing Attacks – URL Tracking Systems are abused for phishing attacks – URL tracking systems are regularly exploited in phishing attacks. The domains used by these systems are commonly known and trusted, making them attractive carriers for phishing URLs.
In this blog, we are going to illustrate a recent phishing attack that employs Google Ads’ tracking system to bypass email filters.
1- How Are URL Tracking Systems Abused For Phishing Attacks?
Piggybacking on a domain is tempting to cyber criminals because using this, they can easily bypass past spam filters, and it is easy to create. By editing an existing URL, the difficulty of setting up their redirect is eliminated, and they can take benefit of the infrastructure already in place to start their own campaign.
URL tracking systems use parameters to move through different pieces of data for handling advertising campaigns.
One of these parameters is typically the final URL that the ad service should redirect people to once they have clicked on the tracking link. For example, for Google Ads, this is the adurl parameter.
Hence, by substituting adurl value with a phishing URL, cyber criminals can quickly undermine a legitimate Google Ads tracking URL and utilize it in their phishing attacks.
Moreover, like Google’s add service, some other well-known URL’s exploited using this tactic like the following:
- sony-europe[.]com
- vioc[.]com
- verizonwireless[.]com
- Vistaprint[.]com
2- How to Prevent Phishing Attacks?
-
Encrypt all sensitive company data.
-
Train your employees and conduct security training sessions using false phishing scenarios.
-
Use a SPAM filter that detects viruses, Malware, blank senders, etc.
-
Use an email security testing tool to evaluate your email security vulnerability.
-
Keep all systems updated with the latest security patches.
-
Install an antivirus solution, program signature updates, and watch the antivirus status on all equipment.
-
Use anti-phishing software.
-
Develop a phishing security policy that involves but isn’t limited to password expiration and complexity.
-
Use a web filter to obstruct malicious websites.
-
Change HTML email into text-only email communications or disable HTML email messages for email security.
-
Obligate encryption for representatives that are telecommuting.
-
Use cyber threat intelligence services to be one step away from hackers.
-
Lastly, have an incident response plan in case a real attack occurs.
URL Tracking Systems are Abused for Phishing Attacks
“This post is originally published at www.keepnetlabs.com”

Teknoloji Haberleri
- Daha iyi bir Windows için PowerToys ve PC ManagerWindows’ta günlük deneyiminizi geliştirecek araçlar mı arıyorsunuz? Microsoft PowerToys ve PC Manager, farklı ihtiyaçlara yönelik çözümler sunarak bilgisayar kullanımını daha verimli ve keyifli hale getiriyor.
- Yine aynı sorun: iOS 18.4, iPhone pillerini "sömürüyor" mu?Apple'ın yeni iOS 18.4 güncellemesi indiren kullanıcılar, iPhone'larının pilinin ışık hızıyla tükendiğinden şikayet etmeye başladı. Peki ama bu pil sorunun sebebi ne? Bu sorundan etkilendiyseniz ne yapmalısınız?
- Windows 11 kurulumunda işler değişiyor: Tek açık kapı da kapanacak mı?Microsoft artık Windows 11'i yüklerken internete bağlanmanız konusunda daha da ısrarcı olacak. Böylece, Microsoft hesabı olmadan Windows 11 kurup kullanma çağı da sona eriyor.
- vivo V50 Lite İncelemevivo’nun yeni orta segment telefonu V50 Lite, 4 yıl garanti verdiği 6500 mAh’lih pili, şık ve ince formu, yüksek çözünürlüklü ve yansıma yapmayan ekranıyla tüketicilerin kalbini çalmaya aday. Uygun fiyatlı olarak sürülen bu model, fiyatının üzerinde bir performans da vadediyor.
- Samsung Galaxy Watch'larda can sıkan sorunSamsung’un popüler akıllı saat modelleri Galaxy Watch 7 ve Ultra, rastgele bağlantı kesintileri ve yeniden kurulum gerektiren sıfırlama sorunlarıyla kullanıcıları zor durumda bırakıyor.