Shortened .gov URLs lead to scams
Posted on 22 October 2012.
The fact that cyber crooks often misuse URL shortening services in order to trick users into following dangerous links is not news, but Symantec researchers have lately spotted a considerable increase in malicious links shortened with the service.

The result of a collaboration between and, the service is automatically employed whenever anyone uses bitly to shorten a URL that ends in .gov or .mil.

In the latest spam campaigns, the offered shortened links lead to a site, which then thanks to a open-redirect vulnerability is made to forward the visitors to a scammy work-from-home website that spoofs a legitimate financial news network website:

"To add legitimacy to the website, spammers have designed it so that other links, such as the menu bar at the top and other news articles, actually lead to the financial news website that it is spoofing. However, the links in the article all lead to a different website where the spammer tries to make the sale," the researchers warn.

The campaign seems rather successful, as the shortened URLs have been followed by over 43,000 users in seven days - the majority of which are (not surprisingly) users located in the United States.

The shortened links lend an aura of legitimacy to the offered links, as the users are more inclined to trust them that random ones. The other problem is that too many .gov sites can be compromised to serve as redirectors to other malicious sites.


Email scammers stole $215M from businesses in 14 months

Posted on 29 January 2015.  |  In 14 months there have been nearly 1200 US and a little over 900 non-US victims of BEC scams, and the total money loss reached nearly $215 million.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Jan 30th