GOOGLE APPLICATIONS SCRIPT EXPLOITED IN SOPHISTICATED PHISHING CAMPAIGNS

Google Applications Script Exploited in Sophisticated Phishing Campaigns

Google Applications Script Exploited in Sophisticated Phishing Campaigns

Blog Article

A new phishing campaign has long been observed leveraging Google Applications Script to provide misleading content material built to extract Microsoft 365 login credentials from unsuspecting customers. This technique makes use of a trusted Google System to lend reliability to malicious one-way links, thus increasing the likelihood of consumer interaction and credential theft.

Google Apps Script is often a cloud-primarily based scripting language created by Google which allows buyers to increase and automate the features of Google Workspace purposes like Gmail, Sheets, Docs, and Push. Crafted on JavaScript, this Resource is commonly useful for automating repetitive jobs, making workflow answers, and integrating with external APIs.

Within this certain phishing Procedure, attackers create a fraudulent invoice doc, hosted through Google Apps Script. The phishing course of action generally starts having a spoofed electronic mail showing to inform the recipient of a pending Bill. These e-mails consist of a hyperlink, ostensibly resulting in the Bill, which works by using the “script.google.com” domain. This domain is an official Google domain utilized for Applications Script, that may deceive recipients into believing the link is Risk-free and from the reliable resource.

The embedded connection directs customers into a landing site, which can involve a concept stating that a file is obtainable for down load, along with a button labeled “Preview.” Upon clicking this button, the person is redirected to the forged Microsoft 365 login interface. This spoofed web site is built to closely replicate the legit Microsoft 365 login monitor, such as layout, branding, and person interface things.

Victims who don't figure out the forgery and continue to enter their login credentials inadvertently transmit that info straight to the attackers. Once the qualifications are captured, the phishing webpage redirects the user towards the genuine Microsoft 365 login site, developing the illusion that very little abnormal has transpired and reducing the chance the consumer will suspect foul Participate in.

This redirection approach serves two key functions. 1st, it completes the illusion which the login endeavor was routine, lowering the likelihood that the sufferer will report the incident or alter their password promptly. Next, it hides the destructive intent of the earlier interaction, rendering it more durable for stability analysts to trace the party with out in-depth investigation.

The abuse of trusted domains such as “script.google.com” offers an important problem for detection and prevention mechanisms. E-mails that contains backlinks to respected domains frequently bypass basic e mail filters, and consumers tend to be more inclined to have faith in hyperlinks that surface to come from platforms like Google. This type of phishing marketing campaign demonstrates how attackers can manipulate perfectly-acknowledged companies to bypass conventional security safeguards.

The specialized foundation of this assault relies on Google Apps Script’s Website app abilities, which allow builders to build and publish Internet applications obtainable by means of the script.google.com URL framework. These scripts is often configured to serve HTML content, handle sort submissions, or redirect users to other URLs, producing them suitable for malicious exploitation when misused.

Report this page