wonderfully unique software solutions

More phishers target Microsoft 365 services via Google Docs

Phishing attacks are using Google Docs to steal Office 365 credentials through faked Microsoft sign-in pages, according to Kaspersky’s Roman Dedenok.

“Scammers have been resorting to all sorts of tricks to get business users to enter their passwords on a website made to look like Microsoft’s sign-in page,” he writes.

Typically, the latest attack begins by sending a phishing email that includes a Google Docs link and a vague message from an unknown sender about money, asking the recipient to click on the deposit type or confirm the sum.

Although security systems may alert the recipient, the link connects via Google Docs to a screen mimicking the Microsoft OneDrive corporate service page.

“Users can even see that the document is available to any company user — likely in hopes someone will forward the link to a corporate accountant,” writes Dedenok.

“The screen that users see is not a web page. It’s a slide from a Google Docs presentation that automatically opens in View mode. The Open button on it can conceal any link at all. In this case, the link connects to a phishing page disguised as an Office 365 sign-in page.”

Google Docs phishing scams are not new.

Kaspersky’s Dedenok indicates that companies should keep staff aware of potential threats and how to spot them on an ongoing basis, as well as adopting link-screening tools at corporate network and individual workstation levels. People should not trust messages with an unclear purpose, he says.

Other red flags in this case included the fact that emails from external sources don’t tend to link to a company’s internal documents and that real financial documents are set to open for specific people, not every single person in an organisation.

In addition, the filename in the letter does not match the one allegedly stored on OneDrive and anyway Google Docs doesn’t host Microsoft OneDrive pages. OneDrive is not Outlook, an Open button in OneDrive should not lead to an Outlook sign-in page, and the latter don’t reside on Amazon websites, notes Dedenok.

Read what Kaspersky has to say about the Colonial Pipeline ransomware attack — specifically, contact authorities promptly to reduce the potential damage.

( Photo by Solen Feyissa on Unsplash )

Recent Articles

Foxit PDF editor suite expands AI capabilities for 2024

Smart PDF commands and enhanced AI assistant functionality are set to give the desktop and cloud versions of Foxit PDF Editor Suite...

Vyond bundles in further AI and branding capabilities for corporate creatives

Video creation platform vendor Vyond is expanding its offerings with new brand-management tools as well as further generative AI functionality responding to...

LastPass analyst warns of looming credentials crisis

Organisations should beware of an oncoming crisis in the secure management of user access, according to a cybersecurity specialist at password management...

Octopus Deploy follows Codefresh buy with 2024.1 Server

Continuous delivery (CD) pipeline platform vendor Octopus Deploy has acquired fellow development software specialist Codefresh and rolled out a new version of...

Top-25 cloud list runs gamut from Visma to Cloudflare, Wasabi to Azul

The Software Report market insights website has named 25 software companies as the top companies in cloud computing for 2024, offering specific...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox