Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Saturday August 17 2019, @11:07AM   Printer-friendly
from the hook-them-and-crook-them dept.

Submitted via IRC for SoyCow7671

Phishing Campaign Uses Google Drive to Bypass Email Gateways

A highly targeted phishing campaign was recently observed while bypassing a Microsoft email gateway using documents shared via the Google Drive service to target the staff of a company from the energy industry.

Google Drive is a file storage and synchronization service created by Google that enables its users to store files in the cloud and effortlessly synchronize them between devices and platforms. The documents used to link to the phishing landing page were delivered using Google Docs, Google's online word processor.

The phishing messages spotted by Cofense security researchers impersonated the CEO of the company and tried tricking the employees to open an "important message" shared via Google Docs, Google's online word processor.

"The email is legitimately sent by Google Drive to employees and appears to be shared on behalf of the CEO by an email address that does not fit the email naming convention of the targeted company," found Cofense.

This made it possible for the attackers to take advantage of Google's legitimate service to circumvent the phishing detection protection provided to the company by the Microsoft Exchange Online Protection cloud-based email filtering service.

In reality, the document linked to a Google Docs document which, in turn, redirected the potential victims to the attackers' phishing landing pages that would request them to enter their credentials to access the CEO's urgent message.

"The link within the email body is also hard to defend against because it links to an actual Google Drive share," also found the Cofense researchers.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Insightful) by jmichaelhudsondotnet on Saturday August 17 2019, @01:24PM

    by jmichaelhudsondotnet (8122) on Saturday August 17 2019, @01:24PM (#881516) Journal

    So, using two software suites operated essentially by a bunch of TLA's holding hands, a vulnerability was discovered?

    You don't say.

    The question here is not what or who is secure, but which bad actors will get your data and how they will use it to abuse you. They might have an interesting argument over which one will get to abuse you first.

    Is there a way to filter out of my brain all 'security update' information regarding platforms I have already for years known to be absolutely untrustworthy?

    The guy trying to build a perfectly level object atop the leaning tower of pisa also having a lot of trouble I hear, but I don't have any extra time to worry about people trying to do futile things.

    Starting Score:    1  point
    Moderation   +2  
       Insightful=1, Interesting=1, Total=2
    Extra 'Insightful' Modifier   0  

    Total Score:   3