The "Read the message" button had a TitanHQ link wrapper on it. That wrapper pointed to a Cisco secure-web URL. The Cisco URL pointed to shoppingtrends.in, a domain hosting a malware payload with a broken TLS certificate.
Both TitanHQ and Cisco scanned the link. Both returned Clean.
That is not a failure of the individual products. It is a deliberate architectural exploit. Stack two competing security vendor wrappers on the same URL, and each one evaluates the other vendor's infrastructure instead of the final destination. The malicious payload sits one more hop past where either scanner looks.
The email arrived on March 30, 2026 at 21:37 UTC. No subject line. The visible From name was "Sarah Hamilton," sending from noreply0@openservices[.]com[.]mx via Amazon SES (eu-west-1). SPF, DKIM, and DMARC all passed cleanly.
The body was a standard Office 365 encrypted message notification template: Microsoft blue header, padlock icon pulled directly from outlook.office365.com, footer links pointing to legitimate Microsoft privacy pages. One call-to-action button in the center labeled "Read the message."
The text block below the button said "Alex Schneider" had sent a protected message, and that "JULY has sent you an encrypted email" to protect retirement plan data. The JULY Secure Email Guide reference pointed to julyservices[.]com. JULY is a real retirement services company. The Microsoft template visuals are real. The padlock image is real. The footer links are real.
The attacker's contribution was the container holding those components and the button in the middle. Borrow visuals from two trusted brands, insert the payload, send via infrastructure that passes email authentication, and let pattern recognition do the rest.
The CTA button href, extracted from the raw HTML:
`` hxxps://linklock.titanhq[.]com/analyse?url=hxxps%3A%2F%2Fsecure-web.cisco[.]com%2F...%2Fhxxps%253A%252F%252Fshoppingtrends[.]in&data=... ``
Decoded, the chain is:
linklock.titanhq[.]com/analyse (TitanHQ's link analysis and rewriting endpoint)secure-web.cisco[.]com/... (Cisco's URL scanning and rewriting service)hxxps://shoppingtrends[.]in (the final payload destination)TitanHQ's scanner evaluated the link at the linklock.titanhq.com layer. What it found at the end of that URL was a Cisco secure-web.cisco.com address. Cisco's infrastructure. Clean.
Cisco's scanner evaluated the link at the secure-web.cisco.com layer. What it found, depending on when the scan ran and how deeply it unpacked the double-URL-encoding, was TitanHQ-adjacent infrastructure or the final domain. The verdict returned: Clean.
Neither scanner produced a definitive examination of shoppingtrends.in. A third-party security gateway that did look directly at the final domain returned something very different: a "Malware Detected!" block page. Direct HTTPS access produced a TLS hostname verification error. The SSL certificate was not valid for shoppingtrends.in. The A record resolved to 45.133.74.62, hosting in Germany. Cloudflare nameservers but non-matching PTR records.
The domain was not benign infrastructure that happened to have a configuration issue. It was a purpose-built phishing endpoint with enough technical roughness to confirm the attacker was not interested in long-term operation.
URL reputation and link scanning systems operate on a model: examine what is at the destination, compare it against known-bad databases and behavioral signals, return a verdict. That model assumes you can reach the actual destination.
When the destination is two hops of competing vendor infrastructure deep, the probability that any single scanner reaches the payload drops significantly. Two factors work in the attacker's favor here:
Double-URL-encoding. The final shoppingtrends.in URL is encoded twice (%2525 notation). A scanner that does not recursively decode the full chain stops at Cisco's domain and sees only clean infrastructure.
Vendor trust short-circuiting. Scanners commonly stop analysis when they encounter another known security vendor's domain in the redirect chain. Cisco's infrastructure is not a threat. TitanHQ's infrastructure is not a threat. The scanner marks the hop clean and moves on, never reaching the payload.
Three mailboxes received the email before Themis identified it as phishing. All three were quarantined.
See how many phishing emails are getting through your filters.
Themis flagged this at 90% confidence and auto-resolved it without manual SOC intervention. The signals were behavioral, not link scan results:
noreply0@openservices[.]com[.]mx had never sent to this organization before.shoppingtrends.in returned the malware block page and TLS mismatch consistent with attacker-controlled infrastructure.TitanHQ and Cisco said Clean. The behavioral envelope said otherwise.
URL wrappers from legitimate security vendors are not a trust guarantee. They are a scanning attempt, subject to the limitations of what the scanner can see at the moment it scans. Teams configuring detection policy need to account for the gap between "a vendor wrapped this" and "this destination is safe."
Specific posture recommendations:
The IRONSCALES detection model combines behavioral signals with technical indicators. Here, that combination produced an auto-resolution before any of the three affected mailboxes clicked through.
| Type | Indicator | Context |
|---|---|---|
| Domain | shoppingtrends[.]in | Final payload destination. Malware block + TLS hostname mismatch. |
| IP | 45[.]133[.]74[.]62 | A record for shoppingtrends.in. Hosting in Germany. |
| URL | hxxps://linklock.titanhq[.]com/analyse?url=hxxps%3A%2F%2Fsecure-web.cisco[.]com%2F...%2Fhxxps%253A%252F%252Fshoppingtrends[.]in | Full double-wrapped CTA button href |
| URL | hxxps://secure-web.cisco[.]com/1NpS8r5wPus779-QiHIMlywgKjOvjnrl19UL3s9fsZZepwQEOy1Axv55... | Cisco secure-web layer, encodes shoppingtrends.in |
noreply0@openservices[.]com[.]mx | Sending address. Authenticated via Amazon SES eu-west-1. | |
| Infrastructure | a7-44.smtp-out.eu-west-1.amazonses[.]com / 54[.]240[.]7[.]44 | Amazon SES sending IP. SPF pass for SES domain. |
| Image | hxxps://outlook.office365[.]com/Encryption/lock.png | Legitimate Microsoft padlock image pulled to enhance visual authenticity. |
| Body text | "JULY has sent you an encrypted email" | JULY retirement services impersonation. Real company, real brand, attacker-assembled container. |
MITRE ATT&CK: T1566.002 Spearphishing Link, T1036 Masquerading, T1027 Obfuscated Files or Information
Sources: IRONSCALES platform analysis; Verizon 2025 DBIR (phishing primary initial access vector); Microsoft Digital Defense Report 2024 (trusted intermediary abuse increasing); CISA Phishing Guidance SC3; MITRE ATT&CK T1566; IBM X-Force Threat Intelligence Index 2024 (phishing accounts for 41% of initial access vectors)