Trusted website hosting

Summary

Attackers are using trusted websites to house their phishing links, as well as using trusted hosting providers (e.g. Azure, Google, AWS, Cloudflare) to host the phishing pages themselves.

Legitimate services are less likely to be flagged by link analysis tools and effectively cloak the initial URL delivered to the victim to increase the chance of successful delivery of and access to the link.

This prevents many link-based analysis techniques from flagging the malicious page. It also provides the link a level of authenticity that may increase the likelihood of a victim falling for the lure.

Examples

Further reading

Useful resource of sites that allow attackers to “live off trusted sites”