Cybercriminals Exploit Cisco’s Safe Links to Evade Detection and Bypass Security Filters

In a recent development, cybercriminals have been found exploiting Cisco’s Safe Links technology—a feature designed to protect users from malicious URLs—to conduct sophisticated phishing attacks. By leveraging the inherent trust associated with Cisco’s security infrastructure, attackers can evade detection systems and bypass network filters, posing significant risks to organizations.

Understanding Cisco’s Safe Links Technology

Cisco’s Safe Links is a component of the company’s Secure Email Gateway and Web Security suite. It functions by rewriting URLs in emails, directing clicks through Cisco’s scanning infrastructure at secure-web.cisco[.]com. This process aims to protect users by analyzing and blocking access to malicious websites.

Exploitation Techniques Employed by Attackers

Cybercriminals have identified multiple methods to generate legitimate-looking Cisco Safe Links for malicious purposes:

1. Compromising Accounts Within Cisco-Protected Organizations: Attackers gain access to email accounts within organizations that utilize Cisco’s security services. They then send themselves emails containing malicious URLs, which are processed and rewritten by the Safe Links feature, resulting in URLs that appear trustworthy.

2. Exploiting Cloud Services: By leveraging cloud services that route emails through Cisco-protected environments, attackers can generate Safe Links for their malicious URLs. This method capitalizes on the trust users place in cloud-based services and Cisco’s security measures.

3. Recycling Previously Generated Safe Links: Attackers reuse Safe Links from earlier campaigns, banking on the continued trust and functionality of these links to deceive users.

The Concept of Trust by Association

When users encounter URLs beginning with secure-web[.]cisco.com, they often trust the link due to Cisco’s reputable standing in cybersecurity. This phenomenon, termed trust by association, is exploited by attackers to increase the likelihood of users clicking on malicious links without suspicion.

Challenges in Detection and Bypassing Security Measures

Traditional email security gateways primarily analyze the visible domains in URLs to identify potential threats. When a URL displays as secure-web.cisco[.]com, it often passes through filters that would otherwise flag suspicious content. Additionally, attackers exploit the time gap between the emergence of new threats and the ability of Cisco’s threat intelligence systems to identify and classify them as malicious.

These attacks are particularly challenging to detect because they appear legitimate at every technical level. The malicious elements are concealed within the context and behavioral patterns of the communication rather than in obvious technical indicators.

Real-World Examples and Detection Strategies

Recent instances detected by Raven AI include professional-looking Document Review Request emails from purported e-signature services, complete with proper branding and business terminology. These emails are designed to deceive recipients into believing they are legitimate business communications.

Raven AI’s context-aware artificial intelligence successfully identified these attacks by analyzing multiple signals simultaneously, such as:

– Inconsistent Sender Identities: Discrepancies between the sender’s name and email address.

– Suspicious URL Structures: Encoded parameters within the URL that deviate from standard formats.

– Unusual Document Request Patterns: Requests that are atypical for the recipient’s role or organization.

The system’s ability to understand legitimate business workflows allows it to identify when communications deviate from expected patterns, even when they appear professionally crafted.

Implications for Cybersecurity

This development signifies a fundamental shift in cybersecurity threats, where attackers exploit human psychology and business processes rather than just technical vulnerabilities. The weaponization of trusted security infrastructure like Cisco Safe Links underscores the need for advanced, context-aware detection systems. These systems must identify attacks based on intent and behavioral patterns rather than relying solely on domain reputation and signature-based detection methods.

Recommendations for Organizations

To mitigate the risks associated with this exploitation, organizations should consider the following measures:

1. Enhance Employee Training: Educate staff about the potential for trusted security features to be exploited and encourage vigilance when interacting with emails, even those that appear to originate from reputable sources.

2. Implement Context-Aware Detection Systems: Deploy advanced security solutions capable of analyzing behavioral patterns and contextual cues to identify anomalies indicative of phishing attempts.

3. Regularly Update Security Protocols: Stay informed about emerging threats and update security measures accordingly to address new exploitation techniques.

4. Monitor for Compromised Accounts: Establish protocols to detect and respond to signs of compromised accounts within the organization to prevent attackers from generating trusted Safe Links.

By adopting these strategies, organizations can strengthen their defenses against sophisticated phishing attacks that exploit trusted security infrastructures.