Cybercriminals are exploiting the legitimate no-code platform Bubble.io to create malicious applications that serve as redirectors in sophisticated phishing campaigns. According to research from Kaspersky, this technique allows attackers to host their initial phishing link on a trusted domain (*.bubble.io), significantly increasing the likelihood of bypassing email security gateways. The phishing emails typically impersonate well-known services like Microsoft 365, luring victims to click a link that leads to the Bubble-hosted application. This app then silently redirects the user to a final credential harvesting page. This abuse of a legitimate platform's reputation represents a growing trend in phishing and is difficult to defend against, as blocking the entire bubble.io domain would disrupt legitimate business applications.
This phishing technique is a form of 'trust abuse'. Attackers are not hacking Bubble's platform; they are using its features as intended to build a simple application. However, the application's sole purpose is malicious. The attack chain is as follows:
[malicious-app-name].bubble.io.bubble.io is a reputable domain, email filters are less likely to block the link. When the user visits the page, the Bubble-hosted app uses JavaScript or an HTML meta refresh to automatically redirect the browser to a different, attacker-controlled website.This method is an evolution of open redirect abuse and is particularly effective against security solutions that rely heavily on domain reputation for filtering.
The core of the technique is the abuse of the platform's functionality. Attackers sign up for a Bubble account and create a one-page application. Within this page, they embed a simple piece of JavaScript code or an HTML tag to perform the redirection.
Example JavaScript for redirection:
window.location.replace("http://malicious-phishing-site.com");
This is a classic example of T1566.002 - Spearphishing Link combined with T1204.001 - Malicious Link. The use of a legitimate service as an intermediary is a defense evasion technique (T1127.001 - Trusted Developer Utilities Proxy Execution). Kaspersky researchers note that this tactic will likely be integrated into Phishing-as-a-Service (PhaaS) kits, which would automate the creation of these Bubble redirector apps and scale the attack to a massive level.
*.bubble.ioWeb Proxy Logsbubble.io URL to a completely different, often newly registered, domain.window.location.replaceD3-UA: URL Analysis.M1032 - Multi-factor Authentication).Train users to inspect the final URL in the browser's address bar before entering credentials and to be suspicious of redirects.
Deploy phishing-resistant MFA (e.g., FIDO2) to protect accounts even if credentials are stolen.
Mapped D3FEND Techniques:
Use advanced email security gateways that can follow redirect chains and analyze the content of the final landing page.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.