Security News > 2020 > July > Phishing attacks hiding in Google Cloud to steal Microsoft account credentials
By hosting phishing pages at a legitimate cloud service, cybercriminals try to avoid arousing suspicion, says Check Point Research.
The idea is that such phishing pages will better elude detection by security products and more easily ensnare unsuspecting victims.
A recent phishing attack analyzed by cyber threat intelligence provider Check Point Research is using Google Cloud services to conceal its malicious intent.
Built to resemble a Microsoft SharePoint notice, the PDF contains a link to Access Document, which takes the user to the actual phishing page.
Through the entire journey from the initial PDF document to the final PDF report, the campaign appears to be convincing, especially because the phishing page is hosted on Google Cloud.
News URL
Related news
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)
- Phishing-as-a-Service "Rockstar 2FA" Targets Microsoft 365 Users with AiTM Attacks (source)
- Ongoing phishing attack abuses Google Calendar to bypass spam filters (source)
- Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool (source)
- Ransomware gangs pose as IT support in Microsoft Teams phishing attacks (source)
- VPN vulnerabilities, weak credentials fuel ransomware attacks (source)
- New Rockstar 2FA phishing service targets Microsoft 365 accounts (source)
- North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks (source)
- Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security? (source)
- GenAI makes phishing attacks more believable and cost-effective (source)