Cybersecurity

What is a malicious URL and how do we protect against them? (2024 update)

Published on August 21, 2024

Table of Contents

Malicious URLs are hyperlinks designed to facilitate scams or fraudulent activities, intending to acquire sensitive personal information illicitly. However, being aware of these threats and taking proactive measures can help you avoid such links and the range of adverse outcomes they can lead to, from data theft to becoming the target of a cyberattack.

What is URL phishing?

URL phishing occurs when a criminal sends someone a legitimate-looking URL that directs them to a malicious website. The victim is tricked into entering personal or financial information. This type of phishing is highly effective because the URLs often look genuine, closely mimicking well-known and trusted sites.

Phishing scams reported by the National Anti Scam Centre (NASC)
Phishing scams overview statistic. | Image source: NASC

According to the National Anti-Scam Centre (NASC), phishing scams resulted in $25.9 million in losses in 2023, estimated at 108,626 reported cases. This makes phishing one of the top categories of scams by the number of reports, showing a 5.2% increase in losses from 2022. This reflects the increasing sophistication of cybercriminals and the persistent threat to users despite enhanced security measures.

ACCC on phising scams activity 2023
Phising scam increased number of loss. | Image source: accc.gov.au

What do malicious URLs look like?

Improvements in technology and AI and increased user reliance on multiple devices have led to cybercriminals becoming more sophisticated in their approach. Harmful attacks often come in phishing emails, malware-infected web pages, or spam messages, which cybercriminals deliver via email links, text messages, and page advertisements. These URLs often contain embedded ‘downloadables’, including spyware, keyloggers, and viruses.

Malicious websites are well-recognised threats to information security. They are practical tools for propagating viruses, worms, and other malicious code online. Malicious domain owners sometimes opt for multiple cheap domain names (such as xqerty.com), one method of identifying a safe and malicious URL.

A quick look at 3 Malicious URL Examples

1. Phishing URLs

These URLs often appear to be from legitimate sources like banks or online services, tricking users into entering sensitive information on a fake website. For example, a URL like “https://secure-youraccount.com” might lead to a site that looks exactly like your bank’s login page but is actually a phishing site.

Example of phising URL in Google search result
Example of malicious phising URL. Image source: Google.com

2. Malware URLs

Clicking on these URLs can automatically download malicious software to your device. An example could be a link in an email claiming to be a software update or an attachment from a known contact, but it actually installs malware on your system.

Example of malicious malware URL.
Example of malicious malware URL. Image source: Microsoft.com

3. Redirect URLs

These URLs redirect users to unintended websites, often laden with ads or more malicious content. An example is clicking on a shortened URL that takes you to a harmful site instead of the intended destination.

How can we protect against a malicious URL in 2024?

Here are seven strategies to protect against malicious URLs

1. View certificate details

Just because the connection is secure does not mean you know who is on the other end of that connection. Most browsers (like Edge, Chrome, and Safari) allow users to view the certificate by clicking the padlock icon.

2. Use online resources to detect malicious URLs

VirusTotal is a website that analyses suspicious URLs using numerous anti-malware engines and reports URLs associated with malware or other malicious activity. Ensure you have Safe Browsing checks turned on in your settings.

3. Check the domain

If you are eager to know who is running a website or want to check whether it is safe, you can leverage tools like MX Toolbox and WhoIs. These sites can tell you the email address and registration date registered with the website, evaluating and cross-checking for any red flags. Malicious domains are likely to have been registered very recently – always treat new domains with suspicion.

4. Regularly update your systems

Cybercriminals often scan devices for vulnerable applications. Regularly updating your operating systems, applications, and plugins will provide better protection against malware.

5. Use reliable web filters

Web filters can prevent malicious URLs from entering an organisation’s network, offering protection by blocking malicious websites, downloads, and software such as spyware, Trojans, and rootkits.

6. Utilise authentication measures

Two-factor authentication (2FA) is an effective way to verify legitimate users. 2FA requires users to provide multiple forms of identification when logging in, such as a username/password combination and an ID token or biometric scan. This helps protect the system from cyberattacks.

7. Enlighten your employees and your customers

Employees must know how cyber criminals use malicious URLs against organisations and take steps if they suspect suspicious behaviour online. Organisations can ensure staff understand these risks through mandatory training sessions, email alerts of new threats, and regular newsletters highlighting recent scams and security concerns.

Experteq protects your team against malicious URLs

With the rise of cyberattacks and malicious code, security teams have prioritised detecting and protecting against them. Businesses today are vulnerable to malware, ransomware, and other types of cyberattacks daily. We offer cybersecurity solutions tailored to your business needs to protect your networks from these attacks.

Experteq specialises in comprehensive security and cloud solutions that protect your business and customers. Our team focuses on cybersecurity management, including analysts who determine the focus of a cyberattack and take steps to address those attacks. For more information and to get started on protecting your business, contact Experteq.

Table of Contents

Featuring
Experteq
leading Australian technology solutions and services partner
Related posts

Enter your details to subscribe

Get Experteq exclusive monthly thought leadership, insights, latest trends, and customer spotlights directly in your inbox.

Subscriber form
Acceptance

Please enter your details to download

Web download
Acceptance