Malicious redirect chains
Attackers use multi-hop redirect chains to evade detection, fingerprint visitors, and deliver payloads conditionally. This guide covers cloaking, traffic distribution systems, open redirect abuse, and why these chains are difficult to detect.
3 min read
What it is#
Malicious redirect chains are multi-hop redirect sequences designed to evade security tools, filter visitors, and deliver payloads only to intended targets. Unlike legitimate redirect chains (URL shorteners, CDN routing), malicious chains are deliberately complex and conditional, a security scanner following the same URL may see a blank page or a benign site while a targeted user sees a phishing form.
Cloaking#
Cloaking is the practice of serving different content to different visitors based on their characteristics. In a malicious redirect chain, intermediate hops inspect the visitor's User-Agent, IP address, referrer, cookies, and other HTTP headers. If the visitor looks like a security crawler, search engine bot, or comes from a blocklisted IP range, the chain terminates with a benign page or a 404 error. Only visitors matching the target profile (e.g., a specific browser, geographic region, or language) proceed to the malicious payload.
This makes cloaked redirect chains particularly difficult to analyze in automated sandboxes, because the chain literally does not complete for non-targeted visitors.
Traffic distribution systems#
A traffic distribution system (TDS) is server-side infrastructure that routes visitors through redirect chains based on configurable rules. Attackers use TDS platforms to manage campaigns at scale. A single initial URL can lead to different phishing pages, malware downloads, or scam sites depending on the visitor's profile.
TDS platforms support geographic filtering (show a phishing page only to US users), device filtering (serve mobile vs desktop payloads), temporal controls (activate a chain only during business hours), and frequency capping (show the payload only once per IP). Some TDS services are sold as commercial products in underground markets.
Open redirect abuse#
An open redirect is a vulnerability on a legitimate website that allows an attacker to craft a URL on a trusted domain that redirects to an arbitrary destination. For example, trusted-brand.com/redirect?url=evil.com uses the trusted domain's reputation to bypass email filters and URL reputation systems. Open redirects on popular platforms are frequently chained together with other hops to create chains that start on trusted domains, a technique commonly seen in campaigns targeting lookalike domains.
Detection challenges#
Malicious redirect chains are difficult to detect because they are non-deterministic. The same initial URL can produce different chains for different visitors, or no chain at all. Security teams face several obstacles:
- Crawler evasion. Chains may not complete in automated scanning environments.
- Ephemeral infrastructure. Intermediate redirect domains may be active for only hours.
- Mixed legitimate and malicious hops. A chain might pass through a legitimate URL shortener and a compromised WordPress site before reaching the phishing page.
- Client-side redirects. JavaScript-based redirects are invisible to tools that only follow HTTP 3xx responses.
Effective detection requires browser-based crawling that executes JavaScript, geographic diversity in scanning infrastructure, and correlation of redirect chain hops with known malicious domains and TDS fingerprints. Phishing domain detection systems and broader threat intelligence platforms increasingly incorporate redirect chain analysis as a core capability.
Previous
Domain permutation analysis
Next
TLS and SSL certificates
More from Threat intelligence
View allDomain threat intelligence
Domain threat intelligence is the collection and analysis of signals from domain registrations, DNS, certificates, and hosting to detect abuse. This guide covers core data sources, enrichment workflows, and how domain threat intelligence supports incident response.
Malicious domain detection
Malicious domain detection combines registration signals, DNS behavior, content analysis, and reputation feeds to identify domains used for phishing, malware, or fraud. This guide covers detection approaches, scoring models, and false positive management.
What is certificate transparency?
Certificate Transparency (CT) is an ecosystem of public, append-only logs of issued certificates. Originally created to catch rogue certificates after high-profile CA compromises, CT logs have become an important source of threat intelligence for domain and subdomain monitoring.