A phishing attack targeting a financial services firm used a convincing DocuSign impersonation email to chain redirects through Google Maps to an Amazon S3-hosted Microsoft 365 credential harvesting page. The attack bypassed standard email security checks: SPF passed via an unrelated Japanese domain, DKIM was absent, DMARC
•3m read time• From securityboulevard.com
Table of contents
A Redirect Chain Built to Dodge ScannersWhy the Gateway Gave It a PassYour TakeawaySort: