Threat actors are using blob URIs, typically employed for legitimate purposes like serving YouTube videos, to conduct phishing attacks by bypassing Secure Email Gateway defenses. Blob URIs facilitate credential phishing as they generate locally and cannot be directly accessed over the internet, making it hard for analysis tools
Table of contents
By: Jacob Malimban, Intelligence TeamKey PointsWhat are Blob URIs?Attack FlowchartBlob URI ContentSort: