• Link to Rss this site
  • Link to LinkedIn
  • Link to Youtube
  • Link to X
  • Link to Instagram
  • English English English en
  • Deutsch Deutsch German de
Sales: +49 5251 304-800 | Support: +49 5251 304-636
NoSpamProxy
  • PRODUCT
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • NoSpamProxy 25Reports
  • SOLUTIONS
    • M365 Mail Security
    • Managed Certificates
    • 32Guards
  • RESOURCES
    • Documentation
    • Forum
    • Webcast Training
    • Training Courses
    • Support
    • Software Download
  • PARTNERS
    • Finding Resellers
    • Becoming Reseller
    • Partner Portal
    • NFR Licenses
  • COMPANY
    • Contact
    • Testimonials
    • Team
    • Career
    • Events
    • Awards
  • PRICES
  • BLOG
    • Blog
    • Newsletter Subscription
  • FREE TRIAL VERSION
    • Price Request
    • Free Trial Version
  • English
    • Deutsch
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Link Wrapping als Angriffsvektor

Link wrapping as an attack vector

Stefan Feist | Technischer Redakteur
Author: Stefan FeistTechnical Writerhttps://www.linkedin.com/in/stefan-feist-23b257b0/–Connect on LinkedIn

URL rewriting is now one of the standard technologies used in modern email security solutions. This technology promises protection against phishing attacks by rewriting URLs in incoming emails and rechecking them every time they are clicked. However, it is precisely this security feature that is increasingly being exploited by attackers – with alarming effectiveness. Link wrapping attacks have been on the rise since 2024. We explain how link wrapping attacks work and how you can protect yourself.

05.01.2026|zuletzt aktualisiert:19.01.2026

What is link wrapping?

When URL rewriting is enabled, the email gateway replaces all URLs in incoming messages with its own redirect links. Instead of https://example.com/beispieldokument, the recipient sees a link such as https://safelinks.protection.outlook.com/?url=https://example.com/beispieldokument. When the user clicks on it, the software checks the target URL in real time – this is often referred to as time-of-click protection.

Attackers use such rewritten links from security products and use them in their emails. Since these services and their domains are well-known and long-established, they enjoy a certain reputation – which is what makes these attacks so dangerous.

All clicked URLs are rewritten and redirected so that known malicious targets can be blocked at the time of the click. This method is effective for known threats; however, attacks can still be successful if the rewritten link has not yet been identified as dangerous at the time of the click.

Criminals go to great lengths

In many cases, it is unclear how criminals obtain the rewritten links. It is possible that the attackers themselves use a security product with URL rewriting to obtain rewritten links. They then rewrite dangerous links and send them to their victims.

It is also conceivable that criminals have gained access to a mailbox through previous successful phishing attempts, in which all incoming links are automatically rewritten by a click-time protection service. The criminals then send their own link to the compromised email address and redirect the rewritten link to use it in their own phishing campaign.

Since these are new links, they are not yet blocked, or – in the case of delayed activation – there is no malicious content on the target URL yet. Only later is the harmless page replaced by a phishing website. In these cases, the attackers often operate within a short time window: sooner or later, the abused service will also recognize the target URL and thus block access.

    There is a significant risk

    Stefan Cink, Director of Business and Professional Services at NoSpamProxy, also points out that there is a significant risk because if email security gateways are configured to no longer check links from known services, manipulated URLs are highly likely to end up directly in the recipient’s inbox.

    In such cases, companies are dependent on the rewrite service they use to recheck the URL and, ideally, block access. However, this downstream control is not reliable enough.

    NoSpamProxy solves this problem differently: 32Guards centrally evaluates rewritten links from legitimate services in the cloud. To do this, the 32Guards crawler infrastructure is used to examine all rewritten links from known URL rewriting services. As with URL shorteners, the redirects are checked.

    If necessary, the entire attack chain, including the rewritten link, is immediately blocked for all 32Guards customers in the Global Threat Database. Customers of NoSpamProxy Server and NoSpamProxy Cloud who use URL Safeguard are protected retroactively, even if the email has already been delivered to the mailbox. In an ongoing spam campaign, new delivery attempts with this URL, now recognized as malicious, are immediately blocked.

    How can you protect yourself?

    • Use URL Safeguard

      This allows URLs to be blocked at a later point in time. Link wrapping is not an argument against using URL Safeguard, but rather in favor of it. This is the only way to reliably block complex attacks in which legitimate services are abused and the actual target is concealed behind a chain of URLs, even if detection is delayed.

    • Report false negatives

      Always report false negatives! Spammers put a lot of effort into this, which is why reporting False Negatives promptly can lead to such URLs being blocked retrospectively.

    • Use multi-factor authentication (MFA)

      Link wrapping is typically used for phishing. Using MFA in addition to this can help. Multi-factor authentication prevents stolen access data from being sufficient for a successful attack on its own. Even if users click on a manipulated link and reveal their access data, MFA reliably blocks unauthorized access.

    Not yet using NoSpamProxy?

    With NoSpamProxy Protection, you can reliably protect your company from dangerous phishing emails and benefit from many other security features. Request your free trial now!

    Get your free NoSpamProxy trial now!

    • share 
    • share 
    • share 
    • email 

    SEARCH

    PRODUCT

    • All Topics
    • NoSpamProxy Cloud
    • NoSpamProxy Protection
    • NoSpamProxy Encryption
    • NospamProxy Large Files

    You need support?

    You can find more information about NoSpamProxy in our documentation and forum.

    CATEGORY

    • All Topics
    • News
    • Product
    • Tech & Support
    • Events

    NoSpamProxy Newsletter

    Subscribe to Newsletter
    RSS Feed Logo RSS Feed Logo Subscribeto RSS Feed

    NoSpamProxy

    • NoSpamProxy Cloud
    • NoSpamProxy Encryption
    • NoSpamProxy Large Files
    • NoSpamProxy Disclaimer
    • Price request
    • Team
    • Career
    • General terms and conditions
    • Data Protection Information for Business Partners and Applicants
    • Cybersecurity (PSIRT)

    Partners

    • Becoming a reseller
    • Partners
    • Order Certificates
    • Newsletter

    Categories

    • All topics
    • News
    • Support
    • Updates
    • Order certificates

    Latest News

    • Gelöschter SPF-Eintrag: Warum DNS-Alarmierung unverzichtbar ist 800x800
      When the service provider deletes the SPF record: Why DNS alerts are essential16.01.2026 - 10:00
    • Link Wrapping als Angriffsvektor 800x800
      Link wrapping as an attack vector05.01.2026 - 10:02
    • Info Icon
      React vulnerability: NoSpamProxy is not affected12.12.2025 - 13:00
    IMPRINT • EULA • Privacy Policy • • © 2026 Net at Work GmbH
    • Link to Rss this site
    • Link to LinkedIn
    • Link to Youtube
    • Link to X
    • Link to Instagram
    Link to: React vulnerability: NoSpamProxy is not affected Link to: React vulnerability: NoSpamProxy is not affected React vulnerability: NoSpamProxy is not affectedInfo Icon Link to: When the service provider deletes the SPF record: Why DNS alerts are essential Link to: When the service provider deletes the SPF record: Why DNS alerts are essential Gelöschter SPF-Eintrag: Warum DNS-Alarmierung unverzichtbar ist 800x800When the service provider deletes the SPF record: Why DNS alerts are essent...
    Scroll to top Scroll to top Scroll to top