Threat actors are using blob URIs, typically employed for legitimate purposes like serving YouTube videos, to conduct phishing attacks by bypassing Secure Email Gateway defenses. Blob URIs facilitate credential phishing as they generate locally and cannot be directly accessed over the internet, making it hard for analysis tools

5m read timeFrom securityboulevard.com
Post cover image
Table of contents
By: Jacob Malimban, Intelligence TeamKey PointsWhat are Blob URIs?Attack FlowchartBlob URI Content

Sort: