www.armorblox.com
Open in
urlscan Pro
2600:1f18:2489:8202:1542:e5:19c0:d28b
Public Scan
URL:
https://www.armorblox.com/blog/ok-google-build-me-a-phishing-campaign/
Submission: On January 27 via manual from US — Scanned from DE
Submission: On January 27 via manual from US — Scanned from DE
Form analysis
2 forms found in the DOM<form id="mktoForm_1082" __bizdiag="196351835" __biza="W___" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" data-styles-ready="true" style="opacity: 1;">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
color: #fff;
border: 1px solid #75ae4c;
padding: 0.4em 1em;
font-size: 1em;
background-color: #99c47c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
outline: none;
border: 1px solid #447f19;
}
.mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
background-color: #75ae4c;
background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol">
<div class="mktoOffset"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth">
<div class="mktoAsterix">*</div>Email:
</label>
<div class="mktoGutter mktoHasWidth"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true"
data-personalize-email="true"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple"><button type="submit" class="mktoButton" data-personalize-button="true">Subscribe</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
value="1082"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="176-XMJ-030">
</form>
<form style="opacity: 0; font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;" __bizdiag="-748094928" __biza="W___"
novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft"></form>
Text Content
Free risk assessment * Product * Overview * Technology * Integrations * Solutions By Use Case * Business Email Compromise * Email Account Compromise * Executive Phishing * Email Data Loss Prevention * Abuse Mailbox Remediation By Platform * Microsoft Office * Google Workspace By Industry * Financial Services * Education * Healthcare * Customers * Learn * Analyst Validation * Learning Center * Resources * Blog * Company * About Us * News Free risk assessment Back OK GOOGLE, BUILD ME A PHISHING CAMPAIGN Written by Arjun Sambamoorthy Threat Research / 11.19.20 Google’s mail, workplace productivity, and other business services have helped millions of people simplify and share their work. Open APIs, extensible integrations, and developer-friendly tools mean that entire virtual offices - complete with virtual workflows - can exist in a Google ecosystem. Unfortunately, Google’s open and democratized nature is being exploited by cybercriminals to defraud individuals and organizations of money and sensitive data. The Armorblox threat research team has seen a sharp uptick in attackers using Google services to help them get emails past binary security filters based on keywords or URLs. In this blog, we will outline five targeted phishing campaigns that weaponize various Google services during their attack flow. These attacks are representative but in no way exhaustive - they are the tip of a deep iceberg. If successful, these email attacks using Google services could have potentially impacted tens of thousands of mailboxes within Armorblox customer environments alone. -------------------------------------------------------------------------------- 1. AMERICAN EXPRESS CREDENTIAL PHISHING Fig: Summary of the American Express credential phishing attack ATTACK SUMMARY A credential phishing email impersonating American Express Customer Care that informs readers that they left out providing some information while validating their card. The email includes a link where readers can fill in this information and validate their card. GOOGLE SERVICE USED The phishing page in the email is hosted on a Google form with a smattering of American Express branding. This fairly long form asks victims for their American Express login credentials, card details, and even their mother’s maiden name (which is a common security question). Fig: Phishing page for the AmEx attack was hosted on a Google form Hosting the phishing page on a Google form helps the initial email evade any security filters that block known bad links or domains. Since Google’s domain is inherently trustworthy and Google forms are used for several legitimate reasons, no email security filter would realistically block this link on day zero. OTHER TECHNIQUES USED * Impersonation: American Express Customer Care * Social engineering: Time-bound request to validate AmEx card by providing personal information -------------------------------------------------------------------------------- 2. BENEFACTOR SCAM RECONNAISSANCE Fig: Benefactor scam email with a Google form link ATTACK SUMMARY Cybercriminals impersonate a childless widow who wants to part with large sums of money but has nowhere to disburse it. The email asks people interested to receive money to either click the link in the email or send a reply to the address included in the email body. GOOGLE SERVICE USED The link in the email leads to a seemingly empty Google form with an untitled question and one answer option (Option 1). At first glance, it seems the attackers have been lazy or negligent, but this is a common reconnaissance technique employed at the start of targeted email attacks. Many people will feel the email is suspicious after going through the content and visiting this dummy form. But some people will submit the only option allowed by the form, or they will send a reply to the address provided in the email. This allows attackers to shortlist the most naive and emotionally susceptible email recipients, who will be prime targets for follow-up emails from the childless widow. Fig: Empty Google form used as a reconnaissance technique Just like the earlier American Express credential phishing attack, hosting the phishing page on a Google form here helps the initial email evade any security filters that block known bad links or domains. OTHER TECHNIQUES USED * Impersonation * Social engineering: Emotional request from a widow, temptation of large sums of money. -------------------------------------------------------------------------------- 3. SECURITY TEAM IMPERSONATION ATTACK SUMMARY Cybercriminals impersonate an organization’s security administrator team with an email that informs readers that they haven’t received some ‘vital’ emails because of a storage quota issue. The mail body includes a link for readers to verify their information and resume email delivery. A snapshot of the email is given below. We have used a fictional organization called Foxtrot to showcase this email. Fig: Email impersonating the security team with an email delivery failure message GOOGLE SERVICE USED The link in the email leads to a fake login page hosted on Firebase, Google’s mobile platform that enables users to create apps, host files and images, and serve user-generated content. The parent URL of the page - https://firebasestorage.googleapis.com - won’t be blocked by any security filters due to its inherent legitimacy. The login screen is simple, with the email address of the victim pre entered into the first field. Imitating ‘quick fill’ techniques used by forms on legitimate websites is commonly used by cybercriminals to lull victims into a false sense of security. Fig: Phishing page hosted on Firebase Storage OTHER TECHNIQUES USED * Impersonation: security administrator team. * Social engineering: Email focuses on failure to deliver ‘vital’ messages and includes a link to resume email delivery. The email body includes negative repercussions for lack of action (failure to verify your email account will lead to suspension and lost data). * Link redirections: the URL in the email goes through one redirection before landing on the Firebase hosted page, obfuscating the attack flow for any security technology that attempts to follow the URL to its final destination. -------------------------------------------------------------------------------- 4. PAYSLIP SCAM ATTACK SUMMARY Cybercriminals impersonate an organization’s payroll team and send an email with payslip details to victims. The email points readers to a link for them to check if their personal information for the payslip is accurate. A time-bound request to check the email link adds urgency and is likely to make victims click without thinking. This is a variant of the more classic payroll diversion fraud, where cybercriminals impersonate employees and try to divert payroll funds to their own accounts. Fig: Payslip scam email with a Google Docs link GOOGLE SERVICE USED The link in the email leads to a page hosted on Google Docs. Since Google Docs is ever present in our daily lives, the average recipient wouldn’t be surprised to see a Google Docs link in an email from a colleague. It won’t be blocked by any email security filter either - not on Day 0, at any rate. Using a Google Doc in this email is meant to trick both the recipient’s eye test and traditional security layers. Fig: The link in the email leads to a Google Doc that claims to contain payslip information OTHER TECHNIQUES USED * Impersonation: Payroll team. * Targeted email: The email title and body have the recipient’s name to increase legitimacy. * Social engineering: Finance-related email with a time-bound request to take action (check if your personal data is correct by 5pm). * Link redirections: The email links to the Google Doc, which further redirects to the final phishing page (which has now been taken down). These redirections obfuscate link detection technologies from identifying the URL as malicious. -------------------------------------------------------------------------------- 5. MICROSOFT TEAMS CREDENTIAL PHISHING Fig: Summary of the Microsoft Teams credential phishing attack ATTACK SUMMARY This email claimed to come from the company’s IT team and asked readers to review a secure message their colleagues had shared over Microsoft Teams, a popular business collaboration solution. Clicking the link took the targets to a page resembling Microsoft Teams, which further redirected to the credential phishing site resembling the Office 365 login portal. Visit this link if you’d like to learn more about this credential phishing attack. GOOGLE SERVICE USED The Office 365 login portal was hosted on Google Sites, a wiki and web page creation tool that lowers the skill bar needed to create websites. The malice of the page’s intent was hidden behind the legitimacy of the page’s domain. This page would pass most eye tests during busy mornings (which is when the email was sent out), with people happily assuming it to be a legitimate Microsoft page. Fig: Phishing page for the Microsoft Teams attack was hosted on Google Sites OTHER TECHNIQUES USED * Impersonation: IT team + Microsoft Teams * Social engineering: Request to view ‘secure’ messages sent over Microsoft Teams -------------------------------------------------------------------------------- GUIDANCE AND RECOMMENDATIONS 1. FOLLOW 2FA AND PASSWORD MANAGEMENT BEST PRACTICES Since all workplace accounts are so closely interlinked, losing access to your Google account can prove to be very dangerous as cybercriminals send emails in your name to your customers, partners, and loved ones. If you haven’t already, follow these hygiene best practices: * Deploy two-factor authentication (2FA) on all possible business and personal accounts. * Use a password manager to store your various account passwords. * Don’t repeat passwords across accounts or use generic passwords such as your birth date, ‘password123’, ‘YourName123’ etc. 2. SUBJECT SENSITIVE EMAILS TO RIGOROUS EYE TESTS Whenever possible, engage with emails related to money and data in a rational manner. Subject the email to an eye test that includes inspecting the sender name, sender email address, language within the email, and any logical inconsistencies within the email (e.g. why is this childless widow willing to send me millions of dollars?). 3. CREATE YOUR OWN LINES OF AUTHENTICATION You should try to replicate 2FA, even if in a loose sense, for any email that makes unusual requests related to money or data. For example, did your HR rep just email you some payroll details with a Google Doc requesting more information urgently? Call or text the HR rep and confirm that they sent the email. Even if your colleagues are very busy, they will understand and appreciate your caution. 4. AUGMENT NATIVE EMAIL THREAT DETECTION WITH ADDITIONAL CONTROLS To augment existing email security capabilities (e.g. Exchange Online Protection for Office 365 or the Advanced Protection Program for G Suite), organizations should invest in technologies that take a materially different approach to threat detection. Rather than searching through static lists and blocking known bad domains, these technologies should learn from custom organizational data and be able to stop socially engineered threats that contain zero-day payloads like Google Forms, Docs, or pages built on Google Sites. -------------------------------------------------------------------------------- For more email security threat research, news, and industry guidance, sign up for email updates from Armorblox below. We promise to only email you useful information. We also promise not to include any Google Docs or Forms in these emails that ask for your personal information, although that should go without saying :-) Join Armorblox Mailing List ARMORBLOGS Blogs from Armorblox. We couldn't resist the portmanteau. * Email: Subscribe Follow Us -------------------------------------------------------------------------------- READ THIS NEXT GARTNER RELEASES 2020 MARKET GUIDE FOR EMAIL SECURITY News and Commentary / 9.15.20 ARMORBLOX IS OFFICIALLY COOL: HERE'S WHY News and Commentary / 5.6.20 ADDRESSING EMAIL SECURITY'S FALSE POSITIVE PROBLEM News and Commentary / 11.9.20 BLOX TALES #7: BANK OF AMERICA CREDENTIAL PHISHING Threat Research / 6.18.20 5 TIPS TO REDUCE THE RISK OF EMAIL IMPERSONATION ATTACKS News and Commentary / 7.30.21 BLOX TALES #4: VENDOR EMAIL FRAUD + OFFICE 365 CREDENTIAL PHISHING Threat Research / 5.11.20 Armorblox secures enterprise communications over email and other cloud office applications with the power of Natural Language Understanding. The Armorblox platform connects over APIs and analyzes thousands of signals to understand the context of communications and protect people and data from compromise. Over 56,000 organizations use Armorblox to stop BEC and targeted phishing attacks, protect sensitive PII and PCI, and automate remediation of user-reported email threats. Armorblox was featured in the 2019 Forbes AI 50 list and was named a 2020 Gartner Cool Vendor in Cloud Office Security. Founded in 2017, Armorblox is headquartered in Sunnyvale, CA and backed by General Catalyst and Next47. * Product * Overview * Technology * Integrations * Solutions * Business Email Compromise * Email Account Compromise * Executive Phishing * Email Data Loss Prevention * Abuse Mailbox Remediation * Armorblox * Customers * Resources * Blog * Company * About Us * News * Careers -------------------------------------------------------------------------------- © 2021 Armorblox. All Rights Reserved. Privacy Policy. --------------------------------------------------------------------------------