URL Tracking Systems are Abused for Phishing Attacks – URL Tracking Systems are abused for phishing attacks – URL tracking systems are regularly exploited in phishing attacks. The domains used by these systems are commonly known and trusted, making them attractive carriers for phishing URLs.
In this blog, we are going to illustrate a recent phishing attack that employs Google Ads’ tracking system to bypass email filters.
1- How Are URL Tracking Systems Abused For Phishing Attacks?
Piggybacking on a domain is tempting to cyber criminals because using this, they can easily bypass past spam filters, and it is easy to create. By editing an existing URL, the difficulty of setting up their redirect is eliminated, and they can take benefit of the infrastructure already in place to start their own campaign.
URL tracking systems use parameters to move through different pieces of data for handling advertising campaigns.
One of these parameters is typically the final URL that the ad service should redirect people to once they have clicked on the tracking link. For example, for Google Ads, this is the adurl parameter.
Hence, by substituting adurl value with a phishing URL, cyber criminals can quickly undermine a legitimate Google Ads tracking URL and utilize it in their phishing attacks.
Moreover, like Google’s add service, some other well-known URL’s exploited using this tactic like the following:
- sony-europe[.]com
- vioc[.]com
- verizonwireless[.]com
- Vistaprint[.]com
2- How to Prevent Phishing Attacks?
-
Encrypt all sensitive company data.
-
Train your employees and conduct security training sessions using false phishing scenarios.
-
Use a SPAM filter that detects viruses, Malware, blank senders, etc.
-
Use an email security testing tool to evaluate your email security vulnerability.
-
Keep all systems updated with the latest security patches.
-
Install an antivirus solution, program signature updates, and watch the antivirus status on all equipment.
-
Use anti-phishing software.
-
Develop a phishing security policy that involves but isn’t limited to password expiration and complexity.
-
Use a web filter to obstruct malicious websites.
-
Change HTML email into text-only email communications or disable HTML email messages for email security.
-
Obligate encryption for representatives that are telecommuting.
-
Use cyber threat intelligence services to be one step away from hackers.
-
Lastly, have an incident response plan in case a real attack occurs.
URL Tracking Systems are Abused for Phishing Attacks
“This post is originally published at www.keepnetlabs.com”

Teknoloji Haberleri
- Silent Hill 2'nin ardından, Konami ve Bloober Team tekrar bir aradaSilent Hill 2'nin geliştiricisi Bloober Team, Konami ile yeni bir oyun projesi üzerinde çalıştığını duyurdu. Projenin detayları belirsiz olsa da, Konami’nin bir IP’sine dayanacağı kesin. Peki, yeni oyun Silent Hill evreninden mi yoksa başka bir klasik seriden mi olacak?
- Roborock, Saros serisi için Türkiye lansmanını gerçekleştirdiRoborock, Rixos Tersane’de düzenlediği lansmanda, CES 2025’e damga vuran ve akıllı temizlik anlayışını değiştirmeyi hedefleyen yeni Saros serisinin Türkiye pazarına giriş yaptığını duyurdu.
- En acı verici ölümler: Bilim insanları listeyi açıkladıYanarak ölmek, radyasyon zehirlenmesi, böcekler tarafından yenmek ve dekompresyon hastalığı... Bilim insanlarına göre, en acı verici ölüm türleri bu şekilde sıralanıyor. İşte, kayıtlara geçmiş en acılı ölümler ve arkasındaki bilimsel açıklamalar.
- Meta'nın Reels planı: Özel bir Reels uygulaması mı geliyor?Meta, TikTok'un ABD'deki belirsiz geleceğinden faydalanmak istercesine, Instagram'ın Reels'ini tamamen ayrı, özel bir uygulamaya dönüştürebilir.
- 'Kıyamet Deposu'na 14 bin yeni tohum eklendiKıyamet Deposu'nu hiç duydunuz mu?