By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
FinOracle
  • Finance
  • Crypto
  • Technology
  • More
    • CivitasAI Readiness Index
    • Tech Sovereignty Index
    • CivitasAI Health Index
    • Predictions
    • Financial reports
    • Opinion
    • SWOT
Notification
  • HomeHome
  • My Feed
  • My Interests
  • My Saves
  • History
Personalize
FinOracleFinOracle
Font ResizerAa
  • HomeHome
  • My Feed
  • My Interests
  • My Saves
  • History
Search
  • Quick Access
    • Home
    • Contact Us
    • Blog Index
    • History
    • My Saves
    • My Interests
    • My Feed
  • Categories
    • Economy
    • Travel
    • Gossip
    • Business
    • Fashion
    • Health

Top Stories

Explore the latest updated news!
YC Alum Adam Secures .1M to Advance Viral Text-to-3D AI Tool into Professional CAD Copilot | FinOracle

YC Alum Adam Secures $4.1M to Advance Viral Text-to-3D AI Tool into Professional CAD Copilot

Reddit CEO: AI Chatbots Do Not Significantly Drive Platform Traffic | FinOracle

Reddit CEO: AI Chatbots Do Not Significantly Drive Platform Traffic

Reddit Q3 Earnings Surpass Expectations Amid Strong User Growth and Optimistic Outlook | FinOracle

Reddit Q3 Earnings Surpass Expectations Amid Strong User Growth and Optimistic Outlook

Stay Connected

Find us on socials
248.1kFollowersLike
61.1kFollowersFollow
165kSubscribersSubscribe
Made by ThemeRuby using the Foxiz theme. Powered by WordPress
Technology

Phishing Scam Evades Detection Via Google Tools

Lilu Anderson
Last updated: 08.08.2024 6:06 pm
By Lilu Anderson
Share
Phishing Scam Evades Detection Via Google Tools | FinOracle
Photo: Finoracle.net
SHARE

Understanding the New Phishing Threat

Phishing scams are becoming increasingly sophisticated, using trusted platforms like Google Drawings and WhatsApp to deceive users. Researchers from Menlo Security have identified a new campaign that cleverly combines these platforms to execute a phishing attack.

Contents
Understanding the New Phishing ThreatHow the Scam WorksLink Shortening for DeceptionObfuscating the AttackExploiting Microsoft 365 VulnerabilitiesProtecting Yourself from Phishing Attacks

How the Scam Works

The attack begins with a phishing email that appears authentic, urging users to verify their Amazon account. The email contains a link to what seems like a legitimate Amazon page. However, this link directs users to an image hosted on Google Drawings. The choice of Google Drawings is strategic, as legitimate services are often trusted by users and less likely to be flagged by security systems.

Google Drawings is typically used for creating and sharing graphics. In this scam, attackers exploit its ability to embed links within graphics. For instance, a graphic may display a "Verify Your Account" button that, when clicked, redirects to malicious sites.

Link Shortening for Deception

To make the attack more convincing, attackers use link shorteners like those from WhatsApp and "qrco.de". These services condense lengthy URLs into short links that look less suspicious to users and security software. When clicked, these links lead to a fake Amazon login page designed to steal personal and financial information.

Obfuscating the Attack

The attack further obfuscates detection by redirecting victims to the actual Amazon page after their credentials are stolen. This step not only covers the attackers' tracks but also reduces suspicion as users might assume they mistyped their information initially.

Exploiting Microsoft 365 Vulnerabilities

In a related discovery, researchers found vulnerabilities in Microsoft 365's anti-phishing tools. Attackers can manipulate CSS (Cascading Style Sheets) to hide security warnings, such as the "First Contact Safety Tip", which notifies users about potential threats in emails from unfamiliar addresses.

This CSS manipulation can also be used to spoof encrypted email icons, misleading users into believing an email is secure.

Protecting Yourself from Phishing Attacks

To safeguard against such scams, users should:

  • Be wary of unsolicited emails asking for personal information.
  • Double-check URLs before clicking, even if they appear to be from trusted sources.
  • Use comprehensive security software to detect and block suspicious activities.

By staying informed and cautious, individuals can better protect themselves from these evolving phishing threats.

TAGGED:AIALSAmazonAntARBETCamCatCESChoiceCSSCureDeceptionDesignDiscoElfEmailEniFurGoogleGoogle DrawingsIceImageIndividualInformaInformationInkIonLeverLINKLoginMailMicrosoftMicrosoft 365OrePersonPHPhishingPotentialResearchRustSafeSafetySAPScamSECSecuritySinSkinSoftwareSystemTeaThreatThreatsToolUnderstandingURLUSWarWhatsApp
Share This Article
Facebook Copy Link Print
Lilu Anderson
ByLilu Anderson
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.

Related Stories

Uncover the stories that related to the post!
Kevin Hart’s HartBeat Ventures Leads M Series B for AI-Powered Weight Loss App Simple | FinOracle
Technology

Kevin Hart’s HartBeat Ventures Leads $35M Series B for AI-Powered Weight Loss App Simple

Rate Cuts Signal Upside for Bitcoin Stocks | FinOracle
Crypto

Rate Cuts Signal Upside for Bitcoin Stocks

Cyngn Adds to Intellectual Property Portfolio with 18th U.S. Patent | FinOracle
Technology

Cyngn Adds to Intellectual Property Portfolio with 18th U.S. Patent

Market Insights: Ladybug Resource Group Revenue Surges - 02.10.2024 16:34 | FinOracle
Finance

Market Insights: Ladybug Resource Group Revenue Surges – 02.10.2024 16:34

Strong Stock Market Bolsters 401(K) Returns in H1 2023 | FinOracle
Stock Market

Strong Stock Market Bolsters 401(K) Returns in H1 2023

Solana Rising: New Altcoin Challenges Ethereum in Growing Competition | FinOracle
Ethereum

Solana Rising: New Altcoin Challenges Ethereum in Growing Competition

TravelSky vs. Seiko Epson: Comparative Stock Review | FinOracle
Stock Market

TravelSky vs. Seiko Epson: Comparative Stock Review

Investing in Cybersecurity Stocks: Profits from Digital Protection | FinOracle
Investing

Investing in Cybersecurity Stocks: Profits from Digital Protection

Show More
FinOracle

Ready for Core Web Vitals, Support for Elementor, With 1000+ Options Allows to Create Any Imaginable Website. It is the Perfect Choice for Professional Publishers.

  • Quick Links
  • AI
  • AR
  • US
  • Market
  • CES
  • Ion
  • Potential
  • SEC
  • Port
  • War

Quick Links

  • My Feed
  • My Interests
  • History
  • My Saves

About US

  • Adverts
  • Our Jobs
  • Term of Use

© 2025 All Rights Reserved. Design & Developed By Selentium Group AG

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Continue with Google
Continue with Microsoft
Not a member? Sign Up