Technology

Hackers distribute thousands of phishing attacks through Mimecast's secure-link feature

2025-12-11 14:20
341 views
Hackers distribute thousands of phishing attacks through Mimecast's secure-link feature

A legitimate feature is being abused to hide phishing emails and have them land in inboxes.

  1. Pro
  2. Security
Hackers distribute thousands of phishing attacks through Mimecast's secure-link feature News By Sead Fadilpašić published 11 December 2025

A legitimate feature is being abused to hide phishing emails

Comments (0) ()

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system (Image credit: weerapatkiatdumrong / Getty Images)
  • Attackers abused Mimecast’s URL‑rewriting feature to mask malicious links in phishing emails
  • More than 40,000 emails hit 6,000+ organizations, especially consulting, tech
  • Campaign bypassed filters globally, with most victims in the US, though Mimecast says no flaw exists

Cybercriminals are abusing a legitimate Mimecast feature to deliver convincing phishing emails to their victims - at scale.

This is according to cybersecurity researchers Check Point, who claim to have seen more than 40,000 such emails being sent to over 6,000 organizations around the world, in a span of merely two weeks.

First, the crooks would create messages that closely resemble email notifications from reputable brands (SharePoint, DocuSign, or other e-signature notices), paying attention to the details such as logos, subject lines, and display names. Nothing in the messages stands out from routine notification emails.

You may like
  • Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration. Microsoft 365 users targeted by major new phishing operation - here's how to stay safe
  • Facebook Business Suite platform Fake Facebook Business pages are bombarding users with phishing messages - so what can be done?
  • Fake email body Microsoft's branding power is being used by criminals to funnel victims to tech support scam centers - here's what you need to know
Catch the price drop- Get 30% OFF for Enterprise and Business plans

Catch the price drop- Get 30% OFF for Enterprise and Business plans

The Black Friday campaign offers 30% off for Enterprise and Business plans for a 1- or 2-year subscription. It’s valid until December 10th, 2025. Customers must enter the promo code BLACKB2B-30 at checkout to redeem the offer.

View Deal

Consulting, tech, and real estate targeted

At the same time, they would build phishing landing pages that capture credentials or deliver malware. These URLs are wrapped behind one or more legitimate redirect and tracking services, in this case - Mimecast.

Because this service rewrites links to route through a trusted domain, attackers submit their malicious links so the final email shows a Mimecast domain instead of the real destination.

As a result, phishing emails successfully move past email security solutions and filters, and land directly into their victim’s inboxes.

Check Point says that numerous industries were hit by this campaign, but a few - where contracts and invoices exchange is an everyday thing - were hit particularly hard. Those include consulting, technology, and real estate. Other notable mentions include healthcare, finance, manufacturing, and government.

Are you a pro? Subscribe to our newsletterContact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsorsBy submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

The majority of the victims are located in the US (34,000), followed by Europe (4,500), and Canada (750).

Mimecast stressed that this is not a vulnerability, but rather a legitimate feature, that is being abused.

“The attacker campaign described by Check Point exploited legitimate URL redirect services to obfuscate malicious links, not a Mimecast vulnerability. Attackers abused trusted infrastructure – including Mimecast’s URL rewriting service – to mask the true destination of phishing URLs. This is a common tactic where criminals leverage any recognized domain to evade detection.”

Via Cybernews

Best antivirus software headerThe best antivirus for all budgetsOur top picks, based on real-world testing and comparisons

➡️ Read our full guide to the best antivirus1. Best overall:Bitdefender Total Security2. Best for families:Norton 360 with LifeLock3. Best for mobile:McAfee Mobile Security

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Sead FadilpašićSocial Links Navigation

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Logout Read more Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration. Microsoft 365 users targeted by major new phishing operation - here's how to stay safe    Facebook Business Suite platform Fake Facebook Business pages are bombarding users with phishing messages - so what can be done?    Fake email body Microsoft's branding power is being used by criminals to funnel victims to tech support scam centers - here's what you need to know    PDF This new phishing kit turns PDF files into malware - here's how to stay safe    PDF Hackers set to weaponize harmless legit PDFs using new tools, with experts saying that combining it with SpamGPT could be a huge game-changer    Hacker with malware code in computer screen. Cybersecurity, privacy or cyber attack. Programmer or fraud criminal writing virus software. Online firewall and privacy crime. Web data engineer Fake VPN checker tool lets hackers bypass antivirus protections    Latest in Security LastPass ICO levies £1.2 million fine against LastPass — data breach compromised info on 1.6 million users    A representational concept of a social media network OpenAI admits new models likely to pose 'high' cybersecurity risk    Google Chrome app is seen on an iPhone next to Edge and other web browser apps. Microsoft is using new prompts in Edge to try and stop users from downloading Chrome. Google releases emergency fix for yet another zero-day    Russian airline hack came through third-party tech vendor    Data leak 16TB of corporate intelligence data exposed in one of the largest lead-generation dataset leaks    Proton Pass header image showing the announcement of the command-line interface. Proton Pass just made it even easier for developers to retrieve secrets — and that's a win for everyone involved    Latest in News ChatGPT on mobile ChatGPT 5.2 is here and ready to show you professional AI    Mullvad VPN app logo on screen Mullvad retires OpenVPN support on desktop, pushing all users to WireGuard    Swiss flag with view of Geneva city, Switzerland Switzerland will revise proposed law change after backlash from tech industry    Players of Celtic FC celebrate their 1-2 goal during the UEFA Europa League football match Feyenoord Rotterdam and Celtic Glasgow at the Feyenoord Stadium 'De Kuip' in Rotterdam on Novemberr 27, 2025. How to watch Celtic vs AS Roma: Europa League 2025/26 free stream, TV channels, kick-off time    Tim Cook image next to Brad Pitt image ‘They gave us the iPhone camera’: F1 producer Jerry Bruckheimer on Apple’s ‘phenomenal’ involvement in the movie’s production    Samsung Galaxy Z Trifold The Galaxy Z TriFold has a neat PC trick that could justify its price tag    LATEST ARTICLES