How Open Redirect Can Cause Your Clients to Lose Money

5/22/2025 1092 views

I started looking into this after seeing a LinkedIn post by Jérôme Segura, a respected cybersecurity researcher.

Screenshot from the original post. What caught my attention was how a seemingly legitimate ad could be used to trick users through an open redirect — a common but often underestimated vulnerability.

Take a look at this screenshot:

Here’s what’s going on:

  • (Red box) The ad appears to come from a trusted source — www.bit.ly — and is marked as "Sponsored".
  • (Green box) The description mentions a cybersecurity offering and includes a link to or a malicious domain in this case maydaysec.io.

However, the Final URL behind the ad is a malicious link: malicious.com. When a user clicks the ad, gets redirected to malicious site — without verification or warning

This is where open redirects become a real problem.

Example of an Open Redirect Exploit

Here’s a simplified flow of how attackers take advantage of an open redirect on a legitimate domain:

🔗 Example Flow:

1. Vulnerable Domain
A legitimate site like bank.com has an open redirect endpoint, e.g.:
https://bank.com/redirect?url=https://malicious.site/login

2. Abuse Begins
The attacker creates a add using the open redirect:
https://bank.com/redirect?url=https://malicious.site/login`

3. Meta Cloaking
On the malicious.site, the attacker configures the metadata (titledescriptionfavicon) to mimic bank.com.

4. Ad Campaign or Phishing Email
The attacker embeds the link in ads. It looks like it leads to bank.com, and even loads a preview that matches.

5. Redirection Rules
On malicious.site, the attacker can further redirect the user to:

  • A fake login page
  • A malware payload
  • A crypto scam

🧭 Flowchart: Open Redirect Exploitation

User Sees Trusted Domain in Link or ad (e.g., bank.com) --> Link Points to bank.com/redirect --> bank.com Redirects to malicious.site --> malicious.site Loads Bank-like Metadata/ loads a phishing page--> User Enters Credentials / Downloads Malware

$catcomments.txt