Cybercriminals used Google Drive for targeted phishing

Cofense experts found a carefully planned phishing attack against an unnamed energy company. Cybercriminals used the legitimate Google Drive feature for targeted phishing to bypass security systems and lead employees to a malicious page.

The ultimate goal of the campaign was obtaining credentials of corporate users. Attackers posted a message on the Google cloud service allegedly from the head of the attacked organization.

The text spoke about a certain business project, employees were invited to the discussion of it. For details, they were sent to the next page, where the phishing form was located.

“The link within the email body is also hard to defend against because it links to an actual Google Drive share. If the organization’s email body inspection tool does not examine past the first link, phishing countermeasures will mark the email as non-malicious, allowing the phish to avoid another security measure”, — wrote the Cofense researchers.

The criminals sent a link to the file through the “Share” function. This legitimate mechanism does not raise questions about mail filters, and anti-phishing systems cannot check the content to which such notifications lead. As a result, the campaign organizers easily reached the victims.

Reference: Google Drive is a file storage and synchronization service created by Google that enables its users to store files in the cloud and effortlessly synchronize them between devices and platforms.

How to resist phishing attack through Google Drive

Researchers note that such threats can still be stopped by automatic means. Advanced anti-phishing systems check the site that the user wants to go to, and if the domain is registered recently, they block the page.

In addition, attentive users themselves could suspect something was wrong. Although the criminals tried to arrange a phishing letter in the style of the target organization, the corporate logo and other elements turned out outdated. The return address of the false CEO also did not comply with the rules adopted by the company.

Read also: Spear phishing recognized as the fastest growing threat to businesses

Without specifying whether the criminals eventually managed to achieve their goal, experts conclude that such attacks show the importance of teaching users the basics of information security. Studies have shown that such courses increase the competencies of employees, and this knowledge does not disappear even after a year. However, employees of energy companies demonstrate worse absorption abilities than users from other industries.

Earlier this month, security experts spotted targeted attacks on American industry. Housing and utilities companies were hit by the LookBack RAT Trojan, which can take screenshots, track mouse movements, send commands to the computer and read system data.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Brendan Smith

Cybersecurity analyst with 15+ years digging into malware and threats, from early days reverse-engineering trojans to leading incident responses for mid-sized firms.

At Gridinsoft, I handle peer-reviewed breakdowns of stuff like AsyncRAT ransomware—last year, my guides helped flag 200+ variants in real scans, cutting cleanup time by 40% for users. Outside, I write hands-on tutorials on howtofix.guide, like step-by-step takedowns of pop-up adware using Wireshark and custom scripts (one post on VT alternatives got 5k reads in a month).

Certified CISSP and CEH, I’ve run webinars for 300+ pros on AI-boosted stealers—always pushing for simple fixes that stick, because nobody has time for 50-page manuals. Tools of the trade: Splunk for hunting, Ansible for automation, and a healthy dose of coffee to outlast the night shifts.

Leave a Reply

Sending