DNS swapping attacks where trusted email URLs turn malicious after delivery

DNS Swapping Attacks: How URLs Turn Malicious After Email Delivery

December 19, 2025 / in Blog / by Zafar Khan, RPost CEO

Shoe Sizes Don’t Change When You Age. Where URLs Resolve Can Change Even When Aged.

Rocky the raptor here, RPost’s cybersecurity product evangelist. I was in the ski shop the other day, doing what every raptor does around the holidays: soaking in the gear aisle and pretending I need new equipment 😊 I spotted a shiny new ski boot buckle gadget. Sleek. Clever. Possibly unnecessary.

“Wow,” I thought, “maybe Rocky deserves new ski boots.”

Then reality pecked me on the beak. My boots are fine. My raptor feet stopped growing years ago. And once you’re an adult raptor, your shoe size is… well… permanent.

Shoe size doesn’t change when you age. 

And that got me thinking,” What Else Do We Assume Is Permanent?”

From a cybersecurity perspective, my brain wandered (as it often does) to URLs. You know how it works: you get an email, there’s a link, you click it, and it takes you to a website. Click it again tomorrow? Same website. Click it next week? Same website. URLs feel permanent, just like shoe size.

But here’s the thing - that assumption is dangerously wrong. 

URLs Age -- But Where They Resolve Can Change

I was recently chatting with an IT guru at one of our friendly law firm colleagues - sharp mind, has seen things... the kind of person who doesn’t get rattled easily.

He told me several large law firms were dealing with data exfiltration -- that fancy cybersecurity phrase meaning “a massive leak of client data.” 

And the root cause? URLs do not always resolve the same way, even when they’ve been sitting quietly in an inbox for days. Let that sink in. 

The email didn’t change. The link didn’t change. But where the link went changed.

How the Trick Works (In Plain Speak)

Here’s the playbook cybercriminals are using:

  1. Reconnaissance first

They quietly study how people at a firm communicate with clients, vendors, and partners.

  1. Impersonation emails

They send a convincing email that looks totally normal -- familiar sender, familiar context.

  1. A “clean” link

The email contains a link that, at delivery time, resolves to a high-reputation, benign website.

  1. Security scans pass

Inbound email security filters do their job:

  • Check the URL
  • Check the reputation
  • Scan for malware
  • All clear
  1. The email sits in the inbox

Delivered in the evening. No one clicks yet.

  1. Post-delivery weaponization

Hours or days later, the attacker remotely changes where that same URL resolves.

  1. The click

The next morning, coffee in hand, the user clicks the link -- and now it goes to a look-alike login page, a credential harvester, or malware delivery site.

Same link, different destination. Game over!

The Culprit: DNS Swapping

This technique has several names - DNS Swapping, DNS rebinding for phishing, Delayed DNS poisoning, Post-delivery URL weaponization, etc...

What’s happening under the hood is not magic; it’s an abuse of standard internet protocols. Attackers are manipulating DNS, the internet’s address book, to change where a domain points after the email is already delivered.

And here’s the kicker: This behavior is technically “normal” from a protocol perspective, which makes it hard to see and harder to stop.

Why Traditional Security Struggles

Most email security tools scan URLs once, at delivery, assume resolution is static, and trust reputation at that moment in time. DNS swapping breaks that assumption.

This attack doesn’t defeat security -- it waits it out.

Layered Defense: How Raptors (RPost’s RAPTOR) Fight Back 

There is no single silver bullet. You need layers -- the way nature (and raptors) intended.

  1. RAPTOR™ AI -- Stop Recon Before the Strike

Hooked into outbound email, RAPTOR™ AI detects when attackers are quietly studying correspondence patterns.

Less reconnaissance = weaker impersonation = fewer successful attacks.

  1. Double DLP™ AI -- Watch URLs After Delivery

Double DLP™ AI continuously monitors URLs that appear in real, ongoing email conversations. If a DNS change occurs after delivery, this is what happens:

  1. Alert
  2. Intelligence
  3. Pre-emptive defense

This is real-time visibility where most tools go blind.

  1. AI Auto-Lock™ -- Stop the Click Cold

If a link is clicked and behavior looks suspicious, AI Auto-Lock™ immediately locks access to the destination. No credentials stolen, no malware delivered, and no Monday-morning surprises.

Final Thought from a Raptor Who Knows His Boots

Once you’re an adult, your shoe size doesn’t change. But URLs? They can grow fangs after they’ve matured in your inbox.

That’s why RAPTOR™ AI is a must-have additive layer in any modern cybersecurity deployment -- exactly the kind of layered approach Gartner® highlights in its Magic Quadrant™ for Email Security Platforms, where RPost is recognized among the elite.

Bottom line: stay sharp, stay layered, and never assume a link is as stable as your ski boots.