[NDSS 2025] Misdirection of Trust: Demystifying the Abuse of Dedicated URL Shortening Service

发布者:周烩君发布时间:2025-04-08浏览次数:10

Authors:

Zhang Zhibo; Zhang Lei; Zhang Zhangyue; Hong Geng; Zhang Yuan; Yang Min


Publication:

This paper is included in proceedings of the 32nd Network and Distributed System Security Symposium (NDSS 2025)


Abstract:

Dedicated URL shortening services (DUSSs) are designed to transform trusted long URLs into the shortened links.Since DUSSs are widely used in famous corporations to better serve their large number of users (especially mobile users), cyber criminals attempt to exploit DUSS to transform their malicious links and abuse the inherited implicit trust, which is defined as Misdirection Attack in this paper.However, little effort has been made to systematically understand such attacks. To fulfill the research gap, we present the first systematic study of the Misdirection Attack in abusing DUSS to demystify its attack surface, exploitable scope, and security impacts in the real world.Our study reveals that real-world DUSSs commonly rely on custom URL checks, yet they exhibit unreliable security assumptions regarding web domains and lack adherence to security standards.We design and implement a novel tool, Ditto, for empirically studying vulnerable DUSSs from a mobile perspective.Our large-scale study reveals that a quarter of the DUSSs are susceptible to Misdirection Attack.More importantly, we find that DUSSs hold implicit trust from both their users and domain-based checkers, extending the consequences of the attack to stealthy phishing and code injection on users' mobile phones.We have responsibly reported all of our findings to corporations of the affected DUSS and helped them fix their vulnerabilities.