Forced Entry: Phishers Abuse Salesforce Sites

A multi-layered redirect chain uses trusted infrastructure to bypass SEGs.

NEW Piotr Thumbnail 1x1 Feb 25

What is the attack?

  • Phishing Lure: This phishing campaign delivers a deceptive "Partner Portal Access Downgrade" notification, impersonating a business platform and claiming that the recipient’s access to sensitive assets has been temporarily revoked due to policy violations.

  • Salesforce Sites: The attacker uses a *.my.salesforce-sites.com page as an intermediate redirector, which includes JavaScript to delay and obscure the final phishing destination.

Why did it get through?

  • Obfuscated Link: The phishing link is wrapped in a trusted ct.sendgrid.net domain, commonly used by legitimate SaaS platforms. This masks the destination and allows the email to bypass link reputation filters and detection systems.

  • Legitimate Hosting: The intermediate redirector is hosted on Salesforce Sites,a feature that allows organizations to host public-facing web pages on top of the Salesforce platform.

  • URL Crawling/Analysis Protection: The added Captcha functionality limits automated link crawling and URL analysis features, increasing the difficulty for automated detection.

What is required to solve for this attack?

  • Behavioral Analysis: Abnormal’s Behavioral AI flags never-before-seen senders, unusual email content, and URLs as anomalies that enable the detection of novel attacks.

  • Defense-in-depth: This pairs well for defense in depth with the Cloud Email Platform (M365’s) Threat Intelligence layer.