Phishing attacks are using Google Docs to steal Office 365 credentials through faked Microsoft sign-in pages, according to Kaspersky’s Roman Dedenok.
“Scammers have been resorting to all sorts of tricks to get business users to enter their passwords on a website made to look like Microsoft’s sign-in page,” he writes.
Typically, the latest attack begins by sending a phishing email that includes a Google Docs link and a vague message from an unknown sender about money, asking the recipient to click on the deposit type or confirm the sum.
Although security systems may alert the recipient, the link connects via Google Docs to a screen mimicking the Microsoft OneDrive corporate service page.
“Users can even see that the document is available to any company user — likely in hopes someone will forward the link to a corporate accountant,” writes Dedenok.
“The screen that users see is not a web page. It’s a slide from a Google Docs presentation that automatically opens in View mode. The Open button on it can conceal any link at all. In this case, the link connects to a phishing page disguised as an Office 365 sign-in page.”
Google Docs phishing scams are not new.
Kaspersky’s Dedenok indicates that companies should keep staff aware of potential threats and how to spot them on an ongoing basis, as well as adopting link-screening tools at corporate network and individual workstation levels. People should not trust messages with an unclear purpose, he says.
Other red flags in this case included the fact that emails from external sources don’t tend to link to a company’s internal documents and that real financial documents are set to open for specific people, not every single person in an organisation.
In addition, the filename in the letter does not match the one allegedly stored on OneDrive and anyway Google Docs doesn’t host Microsoft OneDrive pages. OneDrive is not Outlook, an Open button in OneDrive should not lead to an Outlook sign-in page, and the latter don’t reside on Amazon websites, notes Dedenok.
Read what Kaspersky has to say about the Colonial Pipeline ransomware attack — specifically, contact authorities promptly to reduce the potential damage.
( Photo by Solen Feyissa on Unsplash )