Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Synnovis Finally Issues Breach Notification After 2024 Ransomware Atta

November 13, 2025

U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks

November 13, 2025

Quantum Route Redirect Phishing Kit Democratizes Cyber-Attacks

November 13, 2025
Facebook X (Twitter) Instagram
Thursday, November 13
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Quantum Route Redirect Phishing Kit Democratizes Cyber-Attacks
News

Quantum Route Redirect Phishing Kit Democratizes Cyber-Attacks

Team-CWDBy Team-CWDNovember 13, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security experts have discovered a new, highly automated phishing-as-a-service (PhaaS) platform that has been streamlining large-scale credential theft across 90 countries for several months.

KnowBe4, which discovered the phishing kit in early August, christened it “Quantum Route Redirect.”

“Quantum Route Redirect is an advanced automation platform that streamlines the entire phishing campaign process, from traffic rerouting to victim tracking. Our security researchers have identified approximately 1000 domains currently hosting this tool,” the vendor explained.

“The tool’s sophistication lies in its simplicity. The kit comes with a preconfigured setup that removes the technical expertise needed to launch such a sophisticated phishing campaign – which in turn can increase the volume of advanced phishing attacks targeting organizations globally.”

Read more on PhaaS: Morphing Meerkat PhaaS Platform Spoofs 100+ Brands

The PhaaS platform is able to distinguish between security tools and users – sending the former to legitimate websites and the latter to the phishing version. This helps it defeat URL scanning and some web application firewall products, KnowBe4 said.

It also offers handy features that help less technically minded cybercriminals, such as:

  • A configuration panel to manage redirect rules, settings and routing logic
  • Monitoring dashboards to view analytics including traffic data
  • Intelligent traffic routing to automatically sort visitors
  • An analytics dashboard that includes victim location, device type and browser information

The platform also offers cybercriminals a variety of themes with which to tailor their phishing emails. These include Docusign and similar, payroll impersonation, payment notification emails, missed voicemail messages and QR codes (quishing).

All of these phishing messages have the same end goal – to push victims to a Microsoft365 credential harvesting page.

Since the platform was discovered several months ago, 76% of victims have come from the US.

Tips For Network Defenders

KnowBe4 urged security teams to adopt a multi-layered defense strategy that combines some or all of the following:

  • Natural language processing (NLP) and natural language understanding to analyze the content of an email message
  • URL (and other payload) analysis, domain analysis, impersonation detection and polymorphic detection
  • Sandboxing to inspect emails
  • Continuous monitoring for potential account compromise
  • A human risk management (HRM) platform featuring deep behavioral analytics, product telemetry and threat intelligence capable of generating risk scores for each user. This information can be used to support personalized training
  • Email threat intelligence to inform company-wide education
  • Rapid incident response policies/procedures to isolate compromised users, block access and perform digital forensics

“Reviewing the organization’s current tech stack and making any necessary adjustments now will help cybersecurity teams to stay ahead of attacks that leverage this technology, as well as whatever the next wave of emerging attacks will also hold,” KnowBe4 concluded.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel
Next Article U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks
Team-CWD
  • Website

Related Posts

News

Synnovis Finally Issues Breach Notification After 2024 Ransomware Atta

November 13, 2025
News

U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks

November 13, 2025
News

Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

November 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

Watch out for SVG files booby-trapped with malware

September 22, 2025

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.