Attackers Abusing Proofpoint And Intermedia Link Wrapping To Deliver Phishing Payloads: Cloudflare
Link wrapping is designed by vendors like Proofpoint to protect users by routing all clicked URLs through a scanning service, allowing them to block known malicious destinations at the moment of click. For example, an email link to [.]com might become . While this is effective against known threats, attacks can still succeed if the wrapped link hasn't been flagged by the scanner at click time. Recent campaigns observed by the Cloudflare Email Security team reveal how attackers are abusing Proofpoint's and Intermedia's link wrapping features to bypass detection and redirect victims to a variety of Microsoft Office 365 phishing pages. This technique is particularly dangerous as victims are much more likely to click on a 'trusted' Proofpoint or Intermedia URL than an unwrapped phishing link. Impact: By cloaking malicious destinations with legitimate urldefense[.]proofpoint[.]com and url[.]emailprotection URLs, these phishing campaigns' abuse of trusted link wrapping services significantly increases the likelihood of a successful attack. Attackers exploit the inherent trust users place in these security tools, which can lead to higher click-through rates and a greater probability of impacts such as:
-
Direct financial loss: By making fraudulent links appear legitimate, attackers lower user suspicion at the critical moment of click-time, making direct financial loss more likely. In 2024, email was the method of contact for 25% of fraud reports. Of these, 11% resulted in financial loss, amounting to an aggregate loss of $502 million and a median loss of $600 per incident.
Compromise of personal accounts leading to identity theft: Link wrapping could serve as a highly reliable method for harvesting personal data. Phishing campaigns are a primary method for attackers to obtain personal information, contributing to 1.1 million identity theft reports in 2024, with credit card fraud and government benefits fraud being top categories.
Significant time burden for victims: Victims of identity theft, often initiated through phishing, face substantial time burdens, with tax-related cases averaging over 22 months (676 days) for resolution in Fiscal Year 2024.
Phishing as leading breach method: Comcast research shows 67% of all breaches start with someone clicking on a seemingly safe link.
Credential theft via phishing: The 300% spike in credential theft incidents observed by Picus Security in 2024 can be fueled by more effective phishing techniques like link wrapping.
“Threat actors are constantly evolving their tactics to exploit even the most trusted layers of email security. What we're seeing with the abuse of link wrapping is a stark reminder that attackers are not just targeting users - they're manipulating the very systems meant to protect them. At Cloudflare, our mission is to stay ahead of these threats with proactive, AI-powered detection and comprehensive visibility across the email attack surface. We're committed to helping organizations in the Middle East and globally close these blind spots and build a more secure digital environment,” concludes Bashar Bashaireh, AVP Middle East, Türkiye & North Africa at Cloudflare.
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.

Comments
No comment