Attack spotlight

Using the X/Twitter link shortener (t.co) to hide an AITM credential phishing payload

June 25, 2025

Using the X/Twitter link shortener (t.co) to hide an AITM credential phishing payload

Phishing attack leveraging the X/Twitter link shortener to hide a malicious link

Ready to see Sublime 
in action
Get a demo
Authors
Brandon Webster
Brandon Webster
Detection

Sublime’s Attack Spotlight series is designed to keep you informed of the email threat landscape by showing you real, in-the-wild attack samples, describing adversary tactics and techniques, and explaining how they’re detected. These attacks can be prevented with a free Sublime account.

EMAIL PROVIDER: Google Workspace

ATTACK TYPE: Credential Phishing

In Q1 2025, we observed X (formerly Twitter) to be the third-most abused platform for Living Off Trusted Sites (LOTS) attacks (read the full threat report). The most common way we see X abused is through the use of its t[.]co link shortener for disguising malicious links. In a recent attack, we saw a bad actor using the t[.]co shortener to deliver an AITM credential phishing payload.

The attack starts with a brief email impersonating a secure message notification. The message is from a “DocuSign-Account” display name at the edocs[.]com domain and features language lifted from a Citrix ShareFile notification. To add legitimacy, the local part of the sender email address includes the local part of the recipient email address. The message subject indicates that the target has an encrypted message about EFT/ACH (direct deposit acronyms) waiting for them.

If the target clicks View Your Message, they are taken to a t[.]co-shortened URL that redirects to a firebasestorage.googleapis[.]com site. This page is the AITM credential phishing payload. It features both Adobe and Microsoft brand impersonation.

If the target enters their email address in an attempt to download the financial PDF, the AITM attack begins. All credentials are passed from this login page to an actual Microsoft OAuth server, but are harvested by the attacker as well.

Detection signals

Sublime's AI-powered detection engine prevented this attack. Some of the top signals for this attack were:

  • Brand confusion: The message references Docusign in the title, ShareFile in the body, and edocs[.]com in the sender domain.
  • Lookalike sender domain: The domain edocs[.]com looks like a potentially legitimate e-document sharing domain, but is not, nor is it associated with any of the referenced brands.
  • Link shortener: A trusted URL shortener (t[.]co) is used to obscure the actual phishing destination.
  • Financial urgency: The subject line creates false urgency about a financial transaction. This is common tactic across multiple attack types.

ASA, Sublime’s Autonomous Security Analyst, flagged this email as malicious. Here is ASA’s analysis summary:

Stay secure against obfuscated payloads

LOTS attacks are popular because they let bad actors hide behind friendly domains. That’s why the most effective email security platforms are adaptive, using AI and machine learning to shine a spotlight on seemingly minor discrepancies.

If you enjoyed this Attack Spotlight, be sure to check our blog every week for new blogs, subscribe to our RSS feed, or sign up for our monthly newsletter. Our newsletter covers the latest blogs, detections, product updates, and more.

Read more Attack Spotlights:

Heading

About the authors

Brandon Webster
Brandon Webster
Detection

Brandon is an Email Security Analyst at Sublime. Having a naturally sharp eye for details, patterns, and anomalies, he enjoys honing his skills in the ever-changing landscape of threat detection and prevention.

Get the latest

Sublime releases, detections, blogs, events, and more directly to your inbox.

check
Thank you!

Thank you for reaching out.  A team member will get back to you shortly.

Oops! Something went wrong while submitting the form.

Related Articles

January 6, 2026
HostPapa abuse treasure trove discovered in GoDaddy email threat hunt
Attack spotlight

HostPapa abuse treasure trove discovered in GoDaddy email threat hunt

Peter DjordjevicPerson
Peter Djordjevic
Detection
Person
December 29, 2025
5 email security trends from 2025
Sublime news

5 email security trends from 2025

Brian BaskinPerson
Brian Baskin
Threat Research
Person
December 18, 2025
How to build fast similarity search for email from the ground up
Sublime news

How to build fast similarity search for email from the ground up

Ross WolfPerson
Ross Wolf
Engineering
Person

Frequently asked questions

What is email security?
Email security refers to protective measures that prevent unauthorized access to email accounts and protect against threats like phishing, malware, and data breaches. Modern email security like Sublime use AI-powered technology to detect and block sophisticated attacks while providing visibility and control over your email environment.

Now is the time.

See how Sublime delivers autonomous protection by default, with control on demand.

BG Pattern