Attackers exploiting an array of Google Services, including Forms, Firebase, Docs and more to boost phishing and BEC campaigns.
<div class="c-article__content js-reading-content"> <p>A spike in recent phishing and business email compromise (BEC) attacks can be traced back to criminals learning how to <a href="https://www.armorblox.com/blog/ok-google-build-me-a-phishing-campaign/" target="_blank" rel="noopener noreferrer">exploit Google Services</a>, according to research from Armorblox.</p> <p>Social distancing has driven entire businesses into the arms of the Google ecosystem looking for a reliable, simple way to digitize the traditional office. Armorblox co-founder and head of engineering Arjun Sambamoorthy just published a report detailing how now-ubiquitous services like Google Forms, Google Docs and others are being used by malicious actors to give their spoofing attempts a false veneer of legitimacy, both to security filters and victims.</p> <p><a href="https://threatpost.com/newsletter-sign/"><img loading="lazy" class="aligncenter wp-image-141989 size-full" src="https://media.threatpost.com/wp-content/uploads/sites/103/2019/02/19151457/subscribe2.jpg" alt="" width="700" height="50"></a></p> <p>“Open APIs, extensible integrations and developer-friendly tools mean that entire virtual offices — complete with virtual workflows — can exist in a Google ecosystem,” Sambamoorthy wrote. “Unfortunately, Google’s open and democratized nature is being exploited by cybercriminals to defraud individuals and organizations of money and sensitive data.”</p> <p>The report gives several specific examples of how Google Services help attackers with their schemes.</p> <h2><strong>Google Forms </strong></h2> <p>One campaign used a Google Form and an American Express logo to try and get victims to enter sensitive information.</p> <p>“Hosting the phishing page on a Google Form helps the initial email evade any security filters that block known bad links or domains,” according to Sambamoorthy. “Since Google’s domain is inherently trustworthy, and Google forms are used for several legitimate reasons, no email security filter would realistically block this link on ‘day zero.'”</p> <div id="attachment_161468" style="width: 225px" class="wp-caption alignright"><img aria-describedby="caption-attachment-161468" loading="lazy" class="size-medium wp-image-161468" src="https://media.threatpost.com/wp-content/uploads/sites/103/2020/11/20155321/SVC-AMEX-215x300.png" alt="" width="215" height="300"><p id="caption-attachment-161468" class="wp-caption-text">The American Express scam. Source: Armorblox.</p></div> <p>Another attack Sambamoorthy found used a fictious letter from a childless widow looking for someone to whom she could bequeath her fortune. The link in the email leads to a Google Form with a blank question field. In this instance, the Google Form helps attackers with the social engineering strategy, the report said.</p> <p>“Many people will feel the email is suspicious after going through the content and visiting this dummy form,” he continued. “But some people will submit the only option allowed by the form, or they will send a reply to the address provided in the email. This allows attackers to shortlist the most naive and emotionally susceptible email recipients, who will be prime targets for follow-up emails from the childless widow.</p> <h2><strong>Google Firebase, Google Sites & Google Docs </strong></h2> <p>Google’s mobile platform Firebase was used in another scheme to host a phishing page, which allowed it to sneak through email filters for the same reason – because Firebase is trusted.</p> <p>In a Google-services-powered payroll diversion fraud scam that Sambamoorthy highlighted, a scam email link sent recipients to a Google Doc file to “confirm” their payment details.</p> <p>And in yet another attack, an email was delivered to victims, purportedly from their own IT team, asking them to review a secure message on Microsoft Teams from a colleague. The link led to web page with a bogus Office 365 login portal hosted on Google Sites.</p> <p>“The malice of the page’s intent was hidden behind the legitimacy of the page’s domain,” Sambamoorthy added. “This page would pass most eye tests during busy mornings (which is when the email was sent out), with people happily assuming it to be a legitimate Microsoft page.”</p> <h2><strong>Hijacking Google Services: A Trend </strong></h2> <p>The ability for malicious actors to leverage Google Services for their activities is starting to emerge as a full-fledged trend.</p> <p>At the beginning of November, researchers found 265 <a href="https://threatpost.com/google-forms-abused-to-phish-att-credentials/160957/" target="_blank" rel="noopener noreferrer">Google Forms impersonating brands</a> like AT&T, Citibank and Capitol One and even government agencies like the Internal Revenue Service and the Mexican Government used in phishing attacks.</p> <p>The forms were removed by Google after researchers from Zimperium reported them.</p> <div id="attachment_161469" style="width: 310px" class="wp-caption alignleft"><img aria-describedby="caption-attachment-161469" loading="lazy" class="size-medium wp-image-161469" src="https://media.threatpost.com/wp-content/uploads/sites/103/2020/11/20155456/SVC-Microsoft-300x169.png" alt="" width="300" height="169"><p id="caption-attachment-161469" class="wp-caption-text">The Teams phish. Source: Armorblox.</p></div> <p>Just days earlier, scammers were found to be using a <a href="https://threatpost.com/scammers-google-drive-malicious-links/160832/" target="_blank" rel="noopener noreferrer">legitimate Google Drive collaboration</a> to trick victims into clicking on malicious links.</p> <p>Even Google Calendar <a href="https://threatpost.com/google-calendar-attacks-mobile/145588/" target="_blank" rel="noopener noreferrer">has been abused</a> in the past, in a sophisticated cyberattack that targeted mobile Gmail users through fraudulent, unsolicited meeting notifications.</p> <p>For its part, Google stresses the company is taking every measure to keep malicious actors off their platforms.</p> <p>“We are deeply committed to protecting our users from phishing abuse across our services, and are continuously working on additional measures to block these types of attacks as methods evolve,” a Google spokesperson told Threatpost by email.</p> <p>The statement added that Google’s abuse policy prohibits phishing and emphasized that the company is aggressive in combating abuse.</p> <p>“We use proactive measures to prevent this abuse and users can <a href="https://support.google.com/docs/answer/2463296?visit_id=637399495940479962-1498256077&rd=1" target="_blank" rel="noopener noreferrer">report abuse</a> on our platforms,” the statement said. “Google has strong measures in place to detect and block phishing abuse on our services.”</p> <p>Sambamoorthy told Threatpost that the security responsibility does not rest on Google alone and that organizations should not rely solely on Google’s security protections for their sensitive data.</p> <p>“Google faces a fundamental dilemma because what makes their services free and easy to use also lowers the bar for cybercriminals to build and launch effective phishing attacks,” he said. “It’s important to remember that Google is not an email security company — their primary responsibility is to deliver a functioning, performant email service.”</p> <p>Sambamoorthy said two-factor authentication (2FA) and maintaining strong passwords with a password manager are the best ways for users to protect themselves. Besides those best practices, the report recommended “rigorous eye tests” of emails “related to money and data.”</p> <p>Organizations, he said, should establish basic security policies and set up mechanisms which are able to adapt to new and evolving threats.</p> <p>“Security has an important ‘process’ component, so organizations should ensure they have the right controls, checks, and balances in place to protect users and data,” Sambamoorthy said. “Since these attack patterns are always evolving, organizations should invest in security technologies that have built-in feedback mechanisms. These mechanisms should learn from new attacks and refine detection algorithms with time ”</p> <p> </p> <footer class="c-article__footer"> <div class="c-article__footer__container"> <div class="c-article__footer__col"> <a href="#discussion" class="c-button c-button--secondary">Write a comment</a> </div> <div class="c-article__footer__col"> <div class="c-article__sharing"> <p><strong>Share this article:</strong></p> <nav class="c-nav-sharing"> <div class="social-likes social-likes_notext" data-title="Google Services Weaponized to Bypass Security in Phishing, BEC Campaigns" data-url="https://threatpost.com/google-services-weaponized-to-bypass-security-in-phishing-bec-campaigns/161467/" data-counters="yes" data-zeroes="yes"><div class="facebook" title="Share via Facebook"></div> <div class="twitter" title="Share via Twitter"></div><div class="linkedin" title="Share via LinkedIn"></div> <div class="reddit" title="Share via Reddit"></div> <div class="flipboard" title="Share via Flipboard"></div> </div> </nav> </div> </div> </div> <div class="c-article__footer__container"> <div class="c-article__footer__col"></div> <div class="c-article__footer__col"> <ul class="c-list-categories"> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/cloud-security/">Cloud Security</a></li> <li><a class="c-label c-label--secondary-transparent" href="https://threatpost.com/category/web-security/">Web Security</a></li> </ul> </div> </div> </footer> </div>