Atacantes, cuyo objetivo principal es robar varias credenciales, recurren cada vez más a servicios de nube pública para alojar archivos señuelo y páginas de phishing. Incluso los servicios de Google se utilizan ahora para el phishing.
Expertos en puntos de control advertir that earlier this year they discovered a campaign, que abusaba de los servicios en la nube de Google. The scammers have developed an interesting scheme that includes several legitimate elements to hide the theft of credentials. This tactic makes it much more difficult to detect attacks.
The attack begins with the attackers uploading a malicious PDF document to Google Drive. This document contains a link to a phishing page (allegedly, the content is available only through SharePoint and therefore you need to follow the link).
The phishing page itself was hosted at storage.googleapis[.]сom/asharepoint-unwearied-439052791/index.html. Allá, the user was prompted to sign in with Office 365 or corporate email. When the victim selected one of the login options, an Outlook login pop-up appeared.
Curiosamente, after entering the credentials, the user actually received a PDF report from a reputable international company. The researchers write that the victims are unlikely to notice such fraud, because the pages are loaded from supposedly legitimate sources and do not arouse suspicion.
Only a look at the source code of the phishing page shows that most of the resources are downloaded from the cybercriminals’ site prvtsmtp[.]сom.
«It turned out that the attackers are using the Google Cloud Functions service, which allows them to run code in the cloud, and the resources on the phishing page are loaded from Google Cloud Functions without exposing the attackers’ own malicious domains», — Check Point experts write.
Research has shown that prvtsmtp[.]сom and many other domains associated with this phishing attack resolve to the same IP address (ucranio 31.28.168[.]4) and other addresses in this block.
This allowed experts to trace the activity of these attackers back to 2018, when they acted in a similar way: primero, they placed phishing pages directly on a malicious site, and then switched to Azure.
“Hackers are attracted to cloud storage services that we often use and trust, making it much more difficult to detect phishing attacks. Traditional “red flags” of phishing attacks, such as similar domains or websites without certificates, will not help us much anymore”, — said Lotem Finkelsteen, a leading threat analyst at Check Point.
Check Point recommends that users of the Google cloud platform, even AWS and Azure users, should be very careful about this trend.
Let me also remind you that GitLab checked its employees: on phishing got every fifth.
Practical steps we can all take to stay protected against these opportunistic attacks are:
- Beware of lookalike domains, spelling errors in emails or websites, and unfamiliar email senders.
- Be cautious with files received via email from unknown senders, especially if they prompt for a certain action you would not usually do.
- Ensure you are ordering goods from an authentic source. One way to do this is NOT to click on promotional links in emails, y en cambio, Google your desired retailer and click the link from the Google results page.
- Beware of “special” offers. “An exclusive cure for coronavirus for $150” is usually not a reliable or trustworthy purchase opportunity.
Make sure you do not reuse passwords between different app.