Attackers are exploiting Cisco’s reputational trust, weaponizing Safe Links to disguise phishing attacks. The result is malicious links passing deep scanning and reaching users under the guise of legitimacy.
Cybercriminals have exploited Cisco's Safe Links technology, a component of Cisco's Secure Email Gateway and Web Security suite, to conduct sophisticated phishing attacks. The attackers are weaponizing Safe Links to bypass email filters and trick users into clicking malicious links masked by Cisco's domain name.
Cisco Safe Links rewrites URLs in incoming emails so that links pass through Cisco’s scanning infrastructure before reaching users. Attackers have capitalized on this rewrite mechanism to disguise phishing links, embedding malicious URLs within seemingly legitimate secure-web.cisco.com links. Because enterprise email systems and web gateways typically trust Cisco domains, these embedded threats often evade detection.
Raven AI, a security analysis firm (formerly Ravenmail), uncovered that attackers are obtaining these Safe Links through various methods:
These links then serve as “trusted” conduits for directing targets to phishing websites.
Phishing is a cyberattack technique where attackers trick individuals into revealing sensitive information, such as usernames, passwords, or financial details, by masquerading as a trustworthy entity. Traditionally, phishing emails use fake websites or domains that resemble legitimate services.
To identify a phishing attack, the following should be noted:
Read also:
According to Cybersecurity News, “The primary techniques include compromising accounts within Cisco-protected organizations to generate Safe Links by emailing themselves malicious URLs, exploiting cloud services that send emails through Cisco-protected environments, and recycling previously generated Safe Links from earlier campaigns.” It further states that “When users see URLs beginning with secure-web[.]cisco.com, they instinctively trust the link due to Cisco’s reputation in cybersecurity, creating what researchers term “trust by association.”
See also: HIPAA Compliant Email: The Definitive Guide (2025 Update)
Traditional phishing often relies on obviously suspicious domains. This attack leverages the trust in Cisco’s security infrastructure itself, making it harder for both automated filters and users to recognize the threat.
Employees should avoid clicking the link, report the email to their IT or security team, and verify the legitimacy of the sender through other communication channels.
Companies can use a multi-layered approach: