Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

11/19/2020
05:50 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Cybercriminals Get Creative With Google Services

Attacks take advantage of popular services, including Google Forms and Google Docs.

Security researchers have reported an uptick in cyberattackers weaponizing Google services to sneak past defensive tools and steal credentials, credit card details, and other personal information.

Related Content:

Unpatched Browsers Abound, Study Shows

The Changing Face of Threat Intelligence

New on The Edge: An Inside Look at an Account Takeover

The Armorblox threat research team today published their analysis of five targeted phishing campaigns they call "the tip of a deep iceberg." These attacks take advantage of several Google services, including Google Forms, Google Docs, Google Site, and Firebase, Google's mobile platform for app development.

"Google is offering all these services that make building applications a lot easier," says Arjun Sambamoorthy, co-founder and head of engineering at Armorblox, of the recent increase in these attacks. "This actually encourages attackers to move toward Google instead of hosting a site themselves … this also adds credibility, in some sense, to phishing sites hosted on Google." 

Most employees, and the security tools they depend on, regularly use and trust Google services – a trust that attackers are well aware of and aim to exploit in these campaigns, he notes.

"There's a whole spectrum of attacks," Sambamoorthy says. While some of the scams appear sophisticated, researchers believe the accessibility of Google could mean an individual or smaller-scale group could be responsible for this activity. The goal appears to be data theft.

One credential phishing email, for example, spoofs American Express and informs recipients they neglected to provide information while validating their card. A link is placed to redirect the reader to a page where they can enter their data. This page, hosted on Google Forms, contains American Express branding and prompts the victim for login credentials, credit card details, and even their mother's maiden name – a common security question, the researchers point out.

In another attack, criminals impersonate an enterprise security team with an email informing a victim they haven't received a "vital" message due to a storage quota issue. The email contains a link for them to verify their data and restart email delivery. The URL redirects to a fake login page hosted on Firebase, where they see their email address prefilled above a password request.

"Imitating 'quick fill' techniques used by forms on legitimate websites is commonly used by cybercriminals to lull victims into a false sense of security," Sambamoorthy wrote in a blog post on the findings, noting the URL goes through one redirect before landing on the Firebase page, concealing the attack flow for any security technology that may attempt to follow it.

Most people use Google Docs in their day-to-day work and may not notice the payslip scam that weaponizes the popular service. Researchers noticed attackers impersonating a business' payroll team with an email containing payslip details. The email, which had the recipient's name in the subject and body to convey urgency, contained a link for readers to check whether their personal data is accurate.

"This is a variant of the more classic payroll diversion fraud, where cybercriminals impersonate employees and try to divert payroll funds to their own accounts," Sambamoorthy wrote.

In another brand impersonation attack, cybercriminals use Google Sites to create a credential phishing page resembling Microsoft Teams. To trick victims into visiting the site, they create an email pretending to come from the company's IT team, asking readers to view a secure Teams message.

Training Employees to Spot Cybercrime
None of the aforementioned brands will request credentials using a Google site, Sambamoorthy emphasized, which is "a fundamental thing to keep in mind" for all employees. If someone is the victim of a social engineering attack, they should be instructed to check in with colleagues to see whether others received the same message before sharing credentials.

"Most of these attackers try to insert themselves into a digital workflow that already exists in the organization," says Abhishek Iyer, director of product marketing at Armorblox, noting this is another factor employees should be aware of.

Both Sambamoorthy and Iyer encourage businesses to adopt multifactor authentication (MFA) wherever possible. This way, even if the attackers steal credentials, it will be increasingly difficult for them to break into other accounts with the same username and password. Iyer also notes that large enterprises that implement MFA may work with vendors that don't, which could prove a risk to the organization. His advice: Educate vendors and ensure they're also using MFA.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3113
PUBLISHED: 2021-01-17
Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and ...
CVE-2020-25533
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
CVE-2021-3162
PUBLISHED: 2021-01-15
Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.
CVE-2021-21242
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
CVE-2021-21245
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...