🔗 Check My Link

Overview

This tool analyzes URLs to identify potential phishing attempts by detecting suspicious anomalies in the link structure. Its primary purpose is to help users discern whether a received link might be a phishing attempt designed to deceive them into revealing sensitive information.

Tactics, Techniques, and Procedures

A typical phishing attack works by an attacker crafting a deceptive email, often one that mimics a trusted source, to manipulate a target into performing a harmful action.
A common tactic is to prompt the user to update their password, while actually redirecting them to a malicious website that steals the login and password.
Even with MFA enabled, the attacker can request and then use a OTP (One Time Passcode) to to quickly break into the real account.
The attacker then collects this data to achieve a malicious objective, such as financial fraud, identity theft, or ask ransom to not divulge stolen data.
Many people fall for this simple trick, for the reasons listed below.

Examples:
How hackers took over Linus Tech Tips
Creator of HaveIBeenPwned Data Breach Site Falls for Phishing Email

  1. Impersonation of legitimate domains
    Attackers often create domain names that closely resemble legitimate ones, employing subtle variations to exploit user trust. These domains may use homoglyphs-characters from different alphabets that appear visually similar to Latin characters. Or even simpler, the letter I (India) might be substituted l (Lima) or the number 1. Or rnicrosoft may be written with r n at the start.

    Example:
    https://www.paypaI.com (note the capital "i" instead of lowercase "l").

  2. Credential submission via URL
    Some phishing attacks embed login credentials directly within the URL, which may trick users into believing they are logging into a legitimate site. These URLs might contain login data that appear to be part of the site but are actually linked to an attacker-controlled domain.

    Example:
    https://www.paypal.com@checkmylink.net/update_password

  3. Subdomain spoofing
    Attackers may use subdomains to make a malicious site appear legitimate. By placing the real domain within a subdomain, the phishing link can appear as though it belongs to a trusted source.

    Example:
    https://www.paypal.com.checkmylink.net/update_password

  4. URL shortening services
    URL shorteners are frequently exploited by cybercriminals to obfuscate the final destination of a link, making it difficult for users to verify where they are being redirected. While URL shorteners are legitimate services, their use in phishing attacks is a common tactic.

    Example:
    https://bit.ly/www.paypal.com/update_password
    Note: Many URL shortening services have been abused for malicious purposes, leading to their shutdowns.

  5. IP address usage
    Attackers may use IP addresses in place of domain names to avoid detection. This is often done to bypass domain-based blacklists and to obscure the true identity of the phishing site.

    Example:
    https://192.168.1.1/www.paypal.com/update_password

  6. Domain age
    A domain’s age can be an indicator of its legitimacy. Older, established domains are more likely to belong to reputable organizations, while newly registered domains (e.g., created within the last few days) may be more likely associated with phishing attacks.

Challenges

Risks in corporate environments

Attention: Using this tool for phishing exercises within organizations can inadvertently trigger alarms or even lead to job loss. To mitigate this, users have the option to disable header fetching when analyzing links.

False positives and False negatives

Solutions for identifying malicious links


Check My Link v2.2
The creators and distributors of this tool disclaim any and all liability for damages, losses, or harm of any kind resulting from the use or misuse of this tool.
Any misuse or exploitation of this tool is strictly prohibited and could constitute grounds for criminal prosecution to the fullest extent permitted by law.
Feedback - Blog