Google’s Infrastructure Used in Sophisticated Phishing Attack: How Threat Actors Bypassed Email Security Filters

Sophisticated Phishing Attack Uses Google’s Infrastructure to Harvest Credentials

In a shocking revelation, threat actors have leveraged an uncommon approach to send bogus emails via Google’s infrastructure, redirecting message recipients to fraudulent sites that harvest their credentials. This “extremely sophisticated phishing attack” has left security experts stunned, and it’s essential to understand the tactics used to stay ahead of these cunning cybercriminals.

The Attack in Detail

The phishing email, which appears to be sent from [email protected], informs the recipient of a subpoena from a law enforcement authority asking for unspecified content present in their Google Account. The email urges the recipient to click on a sites.google[.]com URL to “examine the case materials or take measures to submit a protest.” The URL displays a lookalike page that impersonates the legitimate Google Support page, complete with buttons to “upload additional documents” or “view [the] case.”

The Power of Google Sites

The attackers’ success can be attributed to Google Sites, a legacy product that allows users to host content on a google.com subdomain. This platform supports arbitrary scripts and embeds, making it trivial for attackers to build a credential harvesting site. Moreover, there’s no way to report abuse from the Sites interface, which helps the attackers evade detection.

DKIM Replay Attack

The malicious activity is characterized as a DKIM replay attack, where the attacker creates a Google Account for a newly created domain and then a Google OAuth application with the name that includes the entire content of the phishing message. The attacker then grants their OAuth app access to their Google Account, generating a “Security Alert” message from Google. This message is signed with a valid DKIM key and passes all the checks, making it appear legitimate.

The Attack’s Sophistication

The attackers’ cunning approach involves forwarding the same message from an Outlook account, keeping the DKIM signature intact. This allows the message to bypass email security filters. The message is then relayed through a custom Simple Mail Transfer Protocol (SMTP) service called Jellyfish and received by Namecheap’s PrivateEmail infrastructure, which facilitates mail forwarding to the targeted Gmail account.

Google’s Response

When reached for comment, Google emphasized that it has rolled out fixes to stop the abuse pathway and reiterated that the company neither asks for account credentials nor directly calls users. Google encourages users to adopt two-factor authentication and passkeys, which provide strong protection against these kinds of phishing campaigns.

Actionable Insights

This sophisticated phishing attack serves as a reminder of the importance of staying vigilant and up-to-date with the latest security measures. Here are some actionable insights to help you protect yourself:

  • Be cautious of emails that appear to be from legitimate sources, especially those that ask for sensitive information.
  • Verify the authenticity of emails by checking the sender’s email address and looking for any red flags.
  • Enable two-factor authentication and passkeys to add an extra layer of security to your accounts.
  • Stay informed about the latest phishing tactics and security threats to stay ahead of the game.

Conclusion

This sophisticated phishing attack is a stark reminder of the evolving nature of cyber threats. By understanding the tactics used by attackers, we can better prepare ourselves to stay safe online. Remember to always be cautious, verify the authenticity of emails, and enable additional security measures to protect your accounts.