Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Google forms used in callback phishing scams
    Cyber Security

    Google forms used in callback phishing scams

    techempireBy techempireNo Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    What happened?

    Researchers at Abnormal have discovered the latest evolution in callback phishing campaigns.

    Callback phishing?

    Traditional phishing emails may contain malicious links or attachments and use social engineering techniques to lure recipients into clicking on them.

    Callback phishing tricks unsuspecting victims into calling a fraudulent call center, where they will speak to a real person who then tricks them into downloading and running malware, providing malicious hackers with remote access to their PCs. access.

    How could I be tricked into calling a fake call center?

    It might be easier than you think. You may know the real website address of services like PayPal, Norton, GeekSquad or Disney+, but do you know the phone number for their support desk?

    So all a malicious hacker has to do is send me an email from the service I use giving me a compelling reason to call them…

    ….Maybe you can just call the number in the email.

    Here’s an example of a scam email from PayPal claiming that Netflix has charged you nearly $500. If you don’t recognize the transaction, please call support.

    Well, I know what that might do to some people. But I could certainly just look at the email header and determine that it’s not actually from the company it claims to be.

    Well, yes, you probably would…if you were nerdy enough to check your email so intently. But most people don’t bother doing that.

    Additionally, the latest attacks exploit Google Forms in a rather clever way, making their return phishing emails even more believable.

    clever?

    I think so.

    Here’s what’s going on behind the scenes of the latest BazarCall (also known as BazaCall) attack discovered by Abnormal security researchers.

    The first step is for the attacker to create a false claim in a Google form that includes a thank you message for payment and tells readers to call a number if they wish to stop their purchase.

    This is your electronic statement This is your PayPal payment invoice stating that you purchased Norton Life Lock Antivirus for $342.91. To stop this purchase please call: (830)715-4627

    Next, the attacker changes the form’s settings to automatically send a copy of the completed form to any email address entered into the form.

    Then, and this is where things really start to get clever, the attacker sends an invitation to fill out a form they themselvesrather than their intended victims.

    Therefore, the attacker receives an invitation to fill out a form – when they complete the form, they enter their message Intended victim’s email address Become the form, not your own.

    Ugh! So the victims were given a statement telling them to call a phone number if they wanted to dispute the charges.

    correct!

    But I don’t think this is any better for the attacker than sending a callback phishing email directly to the victim. Why use Google Forms?

    The attacker took advantage of the fact that the email was sent directly through Google Forms (from the google.com domain). It’s an established, legitimate domain that helps make emails appear more legitimate and less likely to be intercepted by email filtering solutions along the way.

    This is really cunning.

    Isn’t it? That’s why businesses and individuals should be vigilant and think twice before calling a customer support call center. Are you sure the number you are calling is a genuine support center, or could it be run by cybercriminals?

    So what does Google think of all this?

    A Google spokesperson told us, “Workspace has multiple layers of defenses in place to keep users safe. We are aware of recent phishing attacks using Forms, and while these appear to be targeting only a small number of users, we are working to improve detection.”


    Editor’s note: The views expressed in this guest author article are those of the contributor and do not necessarily reflect the views of Tripwire

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.