Redirects in Phishing: 21% of Attacks in 2026

Thought open redirects were yesterday's news? Think again. They snagged 21% of phishing emails in early 2026, dodging filters like pros.

Chart of redirect usage in phishing emails for Q1 2026, showing 21% average

Key Takeaways

  • Redirects fueled 21% of phishing emails in Q1 2026, peaking at 32% in January.
  • Not just open redirects – half-open Google/Bing tricks are attacker favorites.
  • Dismissals as 'nuisance' are wrong; probe your own domains and lock down now.

What if that innocent-looking Google link in your inbox is a one-way ticket to scam city?

Redirects in phishing. They’re everywhere in 2026 – or at least in 21% of the phishing emails sniffed out this year. Jan Kopriva’s fresh dig into spam traps and filters paints a picture that’s equal parts alarming and absurd. Attackers probing for open redirects on your domains? Check. Half-baked Google tricks? Double check. And us? Still shrugging it off as low-risk fluff.

Here’s the kicker from his analysis:

Redirect-based phishing accounted for a little over 21 % of all analyzed messages sent out over the first 3 months of 2026 – specifically for 32 % in January, 18 % in February and 16.5 % in March.

Over 350 emails, not a huge sample, but enough to make you spit out your coffee. January hit 32%. That’s no fluke.

Why Dismiss Open Redirects as Harmless?

They’re not OWASP Top 10 material anymore. Fine. But attackers treat them like gold. Why? Simple: a link to google.com screams ‘safe’ to your overworked brain – and to basic email scanners. Click. Redirect. Boom, phishing page. No red flags waving.

Look at the probes Kopriva sees: /out.php?link=https://domain.tld/. Every month. Persistent little bastards.

And it’s not just wild-west open redirects. Half-open ones on Google, Bing – tokens that last forever, reusable anywhere. Lazy design? Or just begging for abuse?

One para. Punch.

Threat actors don’t care about your risk ratings. They exploit what’s there. Kopriva’s seen campaigns abusing Google’s ‘logout’ redirects – legitimate-looking URLs that flip to malware mid-flight. Images in his post show the chain: email link to Google, token magic, fake login. Elegant. Evil.

But here’s my twist, the one Kopriva skips: this reeks of 2010 MySpace phishing glory days. Remember those? Profile scrapers hid behind redirects too. History rhymes – we patched MySpace, ignored the lesson, now Big Tech’s toys get the same treatment. Prediction? If devs keep half-assing context checks, redirects hit 30% by year’s end. Bet on it.

How Bad Is Redirect Abuse in 2026 Phishing?

Kopriva’s Q1 tally: 21% overall. Drops each month, sure – maybe scanners catching up. Or attackers pivoting. Doesn’t matter. URL shorteners count too, though rare. Tracking pixels, ad redirects, logout traps – variety pack of doom.

Not all classic opens. Many ‘half-open’ – need a token, but who verifies lifetime or IP? Nobody. Reused in blasts. Google-style reigns, but Bing joins the party.

Short para. Breathe.

And the irony? We call it a ‘nuisance.’ While blackhats scan your site monthly. Traffic logs don’t lie. Ignore at your peril.

Phishing thrives on trust. Legit domains cloak the poison. Filters choke on that. Users? Click happy. Result: credentials harvested, ransomware queued.

Kopriva’s polite: monitor, restrict. Me? Torch those endpoints. No mercy. If you need redirects, tie ‘em down – session-only, IP-bound, abuse alerts screaming.

Attackers’ Favorite Redirect Playground

Google leads, naturally. That ‘half-open’ gem from last year? Still kicking. Tokens eternal, context-free. Perfect for mass phishing.

Others: ad networks, trackers. Even your logout page – genius misuse. Log out? Nah, log into my fake bank.

Probes constant. Kopriva’s domains buzz with them. Yours too, probably. Check your logs. Today.

Unique angle: corporate PR spin calls this ‘low impact.’ Bull. It’s the gateway drug to OAuth hell, as Johannes noted. Chains to real breaches. Wake up.

Dry laugh: we’re fixing quantum bugs while redirects pick our pockets.

What Now? Stop the Madness

Dev teams: audit yesterday. Kill open ends. Log abuse. Block by default.

Users: hover links. Google? Really? Pause.

Filters: evolve. Signature alone? Dead.

Kopriva’s right – don’t ignore. But let’s not whisper. Scream it.

Long para time: in a world drowning in AI threats, these old-school tricks persist because they’re simple, effective, and overlooked; attackers scan tirelessly, we patch sporadically, phishing volumes explode quarterly, yet redirects hold steady at one-in-five, a reminder that security’s not about shiny new vulns but the dusty ones we forgot, the ones that blend legitimacy with lies so smoothly your aunt clicks without blinking, landing creds in dark web shops before dinner’s cold.

FAQ incoming.


🧬 Related Insights

Frequently Asked Questions

How common are redirects in phishing emails 2026?

About 21% in Q1, per analyzed samples. January peaked at 32%.

Are open redirects still a real threat?

Damn right. Attackers probe constantly; they bypass filters via legit domains.

How to stop open redirect phishing?

Audit endpoints, restrict with context checks, monitor abuse logs.

James Kowalski
Written by

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Frequently asked questions

🧬 Related Insights?
- **Read more:** [FBI Tallies $17.7 Billion Cyber Fraud Haul: Crypto Kings, AI Deepfakes, and Your Wallet's Nightmare](https://threatdigest.io/article/over-17bn-lost-to-cyber-fraud-in-the-last-year-warns-fbi/) - **Read more:** [Microsoft's February 2026 Patch Tuesday Plugs Six Actively Exploited Zero-Days](https://threatdigest.io/article/microsofts-february-2026-patch-tuesday-plugs-six-actively-exploited-zero-days/) Frequently Asked Questions **How common are redirects in phishing emails 2026?** About 21% in Q1, per analyzed samples. January peaked at 32%. **Are open redirects still a real threat?** Damn right. Attackers probe constantly; they bypass filters via legit domains. **How to stop open <a href="/tag/redirect-phishing/">redirect phishing</a>?** Audit endpoints, restrict with context checks, monitor abuse logs.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by SANS Internet Storm Center

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.