SaaS News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

SaaS Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
SaaSNewsHackers Distribute Thousands of Phishing Attacks Through Mimecast's Secure-Link Feature
Hackers Distribute Thousands of Phishing Attacks Through Mimecast's Secure-Link Feature
SaaS

Hackers Distribute Thousands of Phishing Attacks Through Mimecast's Secure-Link Feature

•December 11, 2025
0
TechRadar
TechRadar•Dec 11, 2025

Companies Mentioned

Check Point Software

Check Point Software

CHKP

DocuSign

DocuSign

DOCU

Represent System

Represent System

Why It Matters

The abuse demonstrates that trusted security infrastructure can be weaponized, forcing enterprises to rethink email protection strategies. It highlights a systemic vulnerability that could erode confidence in URL‑rewriting safeguards across the industry.

Key Takeaways

  • •Attackers used Mimecast URL rewriting to hide malicious links
  • •Over 40,000 phishing emails reached 6,000+ organizations
  • •Consulting, tech, real estate sectors were primary targets
  • •Majority of victims located in the United States
  • •Mimecast says feature is legitimate, not a vulnerability

Pulse Analysis

The rise of URL‑rewriting services has given email security platforms a powerful way to protect users, but the same trust can be weaponized. In the recent campaign uncovered by Check Point, threat actors submitted malicious destinations to Mimecast’s secure‑link feature, which then rewrote the URLs to appear under Mimecast’s domain. Because the link resolves through a recognized provider, many gateway filters treat the message as safe, allowing phishing payloads to land directly in inboxes. This technique sidesteps traditional reputation‑based blocks and highlights a blind spot in automated defenses.

The operation was remarkably large, with more than 40,000 phishing emails sent to over 6,000 organizations in just two weeks. Consulting firms, technology providers, and real‑estate companies were hit hardest, reflecting the high value of contract and invoice workflows in those sectors. Geographic analysis shows roughly 34,000 victims in the United States, 4,500 across Europe, and 750 in Canada, underscoring the global reach of a single abuse vector. For security teams, the episode demonstrates that even well‑known vendors can become inadvertent conduits for malicious traffic.

Mitigating this abuse requires a layered approach. Organizations should enforce strict URL‑verification policies, such as sandboxing links before click‑through and flagging any redirects that pass through third‑party services. Mimecast and similar providers can enhance their analytics to detect anomalous rewrite patterns, while offering customers visibility into the original destination. Meanwhile, user education remains critical: employees must be trained to scrutinize unexpected notifications, even when they appear to originate from trusted domains. As attackers continue to co‑opt legitimate infrastructure, continuous monitoring and adaptive controls become essential to preserve email security integrity.

Hackers distribute thousands of phishing attacks through Mimecast's secure-link feature

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...