Phishers now abuse Safe Links and other URL rewriting tools to hide multi-step Microsoft 365 credential attacks


Phishing gangs are increasingly abusing Safe Links and similar email security features to make malicious URLs look trustworthy. Instead of sending victims directly to a fake login page, attackers now route them through several rewritten links generated by legitimate security vendors, making the chain harder for scanners and users to spot.

LevelBlue said it saw a clear escalation in this tactic between the second and fourth quarters of 2025. The company found that attackers moved from single rewritten links to layered redirect chains that stack multiple trusted services in one path, with activity peaking in January 2026.

The campaigns highlighted in the report used Tycoon2FA and Sneaky2FA, two phishing-as-a-service operations that target Microsoft 365 accounts. These kits act as adversary-in-the-middle platforms, which means they can capture usernames, passwords, and session cookies in real time after a victim lands on a fake Microsoft sign-in page.

This tactic works because URL rewriting is supposed to help. Microsoft says Safe Links rewrites URLs in email messages when the feature is enabled, and Microsoft’s recommended Defender for Office 365 settings note that URLs are rewritten by default for email link protection. Attackers are taking advantage of that trust signal by hiding behind vendor-generated links that look safer than the destination really is.

In a normal setup, an email security product rewrites a link so the user clicks a vendor-branded URL first. That click passes through security checks before sending the user to the destination page. Microsoft documents this behavior directly in its Safe Links guidance.

Attackers abuse the same process by sending or relaying messages through environments where rewriting is already active. Once a trusted security product wraps the original link, the attacker can reuse that wrapped URL inside a wider phishing flow. LevelBlue says some campaigns then chain multiple rewritten links together, so automated tools keep seeing known security domains for several hops before the final malicious site appears.

In one example, LevelBlue described a Tycoon2FA campaign using a document-request lure with a URL more than 1,200 characters long. The link reportedly passed through Libraesva, Sophos, Inky, EdgePilot, and Barracuda before reaching a compromised website, which then presented a CAPTCHA and finally a fake Microsoft sign-in page.

A second example involved Sneaky2FA. In that case, researchers said the phishing email used an HTML attachment rather than a normal hyperlink. The file contained a prebuilt redirect sequence through Barracuda, Sophos, and Cisco, then passed through a legitimate marketing platform before resolving to a spoofed domain impersonating the target law firm.

Document request-themed phishing email leading to a Tycoon2FA payload (Source – LevelBlue)

Why this matters for Microsoft 365 users

This trend matters because many users have been taught to trust security-branded links. A URL that contains a well-known vendor domain can look reassuring, especially in fast-moving work environments where employees must review dozens of emails each day. But a trusted wrapper does not guarantee a safe final destination.

Tycoon2FA phishing landing pages (Source – LevelBlue)

It also matters because these phishing kits do more than steal passwords. LevelBlue says Tycoon2FA and Sneaky2FA can capture MFA session cookies, which can let attackers hijack authenticated Microsoft 365 sessions even after a victim completes multi-factor authentication. From there, threat actors can create mailbox rules, move laterally through email, steal data, and sometimes open the door to ransomware or business email compromise.

Multi-layered URL rewriting at a glance

ElementWhat researchers found
Main tacticMultiple trusted URL rewriting services chained together to hide the real destination
Report sourceLevelBlue SpiderLabs
Rise in activityEscalated from Q2 to Q4 2025, peaked in January 2026
Main kits namedTycoon2FA and Sneaky2FA
Main target typeMicrosoft 365 users
Main riskCredential theft and session cookie theft through fake Microsoft sign-in pages

What defenders should do

  • Treat vendor-branded rewritten links as inspected links, not automatically safe links.
  • Flag emails that chain through multiple rewriting services or contain unusually long redirect URLs.
  • Push phishing-resistant MFA, especially hardware security keys and passkey-based sign-in where possible. This reduces the value of stolen credentials and makes session theft harder to turn into full account takeover.
  • Review Safe Links configuration. Microsoft documents an option to avoid rewriting URLs while still checking them through the Safe Links API in supported Outlook clients, which may help some organizations reduce wrapper abuse in specific scenarios.
  • Use URL block and allow controls in Defender for Office 365 to manage suspicious destinations and review exceptions carefully.
  • Train employees to distrust unexpected Microsoft 365 login prompts, even when the surrounding link includes familiar vendor names.

What this says about phishing in 2026

The bigger lesson is simple. Attackers no longer need to beat security tools head-on. In many cases, they only need to route their traffic through trusted infrastructure that security products and users already expect to see. That makes detection slower and investigation harder, especially when every redirect hop looks legitimate at first glance.

Sneaky2FA landing pages targeting Microsoft 365 users (Source – LevelBlue)

This also puts pressure on email defenders to focus less on whether a link contains a known vendor name and more on where the entire chain ends. URL reputation still matters, but chain analysis, behavioral detection, and stronger sign-in protections matter more when phishing kits can hide behind several trusted layers.

FAQ

What is Safe Links?

Safe Links is a Microsoft Defender for Office 365 feature that rewrites email URLs and checks them when users click them. Microsoft says rewriting happens when the feature is enabled.

Are attackers directly hacking Safe Links?

The current research does not say attackers broke Safe Links itself. Instead, they abuse normal URL rewriting behavior and trusted wrapper domains to disguise phishing chains.

Which phishing kits were named in the report?

LevelBlue named Tycoon2FA and Sneaky2FA as two phishing-as-a-service platforms using this tactic against Microsoft 365 users.

Why are multi-layered rewritten links harder to catch?

Because each redirect hop can use a recognized vendor domain. Automated scanners may stop early or give the chain more trust than the final destination deserves.

Can organizations disable URL rewriting?

Microsoft documents a Safe Links option called “Do not rewrite URLs, do checks via SafeLinks API only” for supported scenarios, but organizations need to review compatibility and policy impact before changing that setting.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages