Apr 06, 2026 • SANS Internet Storm Center
How often are redirects used in phishing in 2026?, (Mon, Apr 6th)
This article analyzes the prevalence of open redirects being exploited in phishing campaigns. Open redirects are web vulnerabilities that allow attackers to...
Executive Summary
This article analyzes the prevalence of open redirects being exploited in phishing campaigns. Open redirects are web vulnerabilities that allow attackers to manipulate URLs to redirect users from legitimate websites to malicious destinations. Threat actors actively search for and exploit these vulnerabilities to lend credibility to phishing lures, making them harder to detect since the initial URL appears trustworthy. The abuse of open redirects significantly increases phishing campaign effectiveness by bypassing user suspicion. Mitigation strategies include implementing strict URL validation, restricting redirect parameters, and employing URL reputation services to detect and block malicious redirect chains before users are redirected to phishing pages.
Summary
In one of his recent diaries, Johannes discussed how open redirects are actively being sought out by threat actors[1], which made me wonder about how commonly these mechanisms are actually misused…
Published Analysis
This article analyzes the prevalence of open redirects being exploited in phishing campaigns. Open redirects are web vulnerabilities that allow attackers to manipulate URLs to redirect users from legitimate websites to malicious destinations. Threat actors actively search for and exploit these vulnerabilities to lend credibility to phishing lures, making them harder to detect since the initial URL appears trustworthy. The abuse of open redirects significantly increases phishing campaign effectiveness by bypassing user suspicion. Mitigation strategies include implementing strict URL validation, restricting redirect parameters, and employing URL reputation services to detect and block malicious redirect chains before users are redirected to phishing pages. In one of his recent diaries, Johannes discussed how open redirects are actively being sought out by threat actors[1], which made me wonder about how commonly these mechanisms are actually misused… In one of his recent diaries, Johannes discussed how open redirects are actively being sought out by threat actors[1], which made me wonder about how commonly these mechanisms are actually misused…