Cybercriminals are exploiting the legitimate no-code platform Bubble.io to create malicious applications that serve as redirectors in sophisticated phishing campaigns. According to research from Kaspersky, this technique allows attackers to host their initial phishing link on a trusted domain (*.bubble.io), significantly increasing the likelihood of bypassing email security gateways. The phishing emails typically impersonate well-known services like Microsoft 365, luring victims to click a link that leads to the Bubble-hosted application. This app then silently redirects the user to a final credential harvesting page. This abuse of a legitimate platform's reputation represents a growing trend in phishing and is difficult to defend against, as blocking the entire bubble.io domain would disrupt legitimate business applications.
This phishing technique is a form of 'trust abuse'. Attackers are not hacking Bubble's platform; they are using its features as intended to build a simple application. However, the application's sole purpose is malicious. The attack chain is as follows:
[malicious-app-name].bubble.io.bubble.io is a reputable domain, email filters are less likely to block the link. When the user visits the page, the Bubble-hosted app uses JavaScript or an HTML meta refresh to automatically redirect the browser to a different, attacker-controlled website.This method is an evolution of open redirect abuse and is particularly effective against security solutions that rely heavily on domain reputation for filtering.
The core of the technique is the abuse of the platform's functionality. Attackers sign up for a Bubble account and create a one-page application. Within this page, they embed a simple piece of JavaScript code or an HTML tag to perform the redirection.
Example JavaScript for redirection:
window.location.replace("http://malicious-phishing-site.com");
This is a classic example of T1566.002 - Spearphishing Link combined with T1204.001 - Malicious Link. The use of a legitimate service as an intermediary is a defense evasion technique (T1127.001 - Trusted Developer Utilities Proxy Execution). Kaspersky researchers note that this tactic will likely be integrated into Phishing-as-a-Service (PhaaS) kits, which would automate the creation of these Bubble redirector apps and scale the attack to a massive level.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| url_pattern | *.bubble.io |
While not inherently malicious, a sudden influx of emails with links to this domain could be an indicator of a campaign. | Email gateway logs, web proxy logs. | low |
| log_source | Web Proxy Logs |
Look for a pattern of users being quickly redirected from a bubble.io URL to a completely different, often newly registered, domain. |
SIEM correlation of proxy logs. | medium |
| string_pattern | window.location.replace |
In an email context, URLs that lead to pages with immediate JavaScript redirects are suspicious. | Advanced email sandboxing, URL analysis tools. | high |
D3-UA: URL Analysis.M1032 - Multi-factor Authentication).Train users to inspect the final URL in the browser's address bar before entering credentials and to be suspicious of redirects.
Deploy phishing-resistant MFA (e.g., FIDO2) to protect accounts even if credentials are stolen.
Mapped D3FEND Techniques:
Use advanced email security gateways that can follow redirect chains and analyze the content of the final landing page.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats