Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins

Threat Actors Leversges Google Cloud Services to Steal Microsoft 365 Logins

Posted on January 7, 2026January 7, 2026 By CWS

A classy new phishing marketing campaign has emerged, leveraging the trusted infrastructure of Google Cloud companies to bypass safety filters and steal delicate Microsoft 365 login credentials.

By abusing reliable workflow automation instruments, menace actors are crafting convincing assaults that mix seamlessly with genuine communications, making detection more and more tough for each automated programs and end-users.

This marketing campaign particularly targets organizations counting on cloud-based collaboration platforms, exploiting the interoperability between main service suppliers to facilitate credential harvesting on an enormous scale.

The core of this assault includes the exploitation of Google Cloud Software Integration, a service designed for automating enterprise processes.

Attackers make the most of the “Ship E-mail” function inside this platform to generate phishing emails that seem to originate from a real Google deal with: noreply-application-integration@google[.]com.

As a result of these emails come from a verified Google area and make the most of a point-and-click configuration system, they simply evade normal spam filters and leverage the inherent belief related to the tech big’s infrastructure to deceive targets.

Malwarebytes researchers recognized that this methodology considerably lowers the barrier to entry for cybercriminals, particularly since new Google Cloud clients at the moment obtain free credit which attackers abuse.

The impression of this marketing campaign is extreme, because it exposes vital company credentials to theft. As soon as the preliminary electronic mail is delivered, unsuspecting customers are offered with what seems to be a routine notification, corresponding to a voicemail alert or a doc permission request, additional legitimizing the malicious correspondence.

The An infection Mechanism

The assault employs a intelligent multi-stage an infection mechanism to evade detection. When a sufferer clicks the hyperlink within the phishing electronic mail, they don’t seem to be instantly taken to a malicious web site.

As an alternative, they’re directed to a reliable Google Cloud Storage URL, which reinforces the phantasm of security.

From there, the consumer is redirected to a different Google-owned area, googleusercontent[.]com, which shows a CAPTCHA or “I’m not a robotic” picture verify.

This intermediate step serves two vital functions: it efficiently filters out automated safety crawlers which may flag the phishing web site and psychologically primes the sufferer to conform.

Upon passing the verify, the goal is lastly redirected to a fraudulent Microsoft 365 sign-in web page designed to seize usernames and passwords. Though this web page visually mimics the official portal, an in depth inspection of the net deal with reveals its malicious nature.

Google has acknowledged this abuse and acknowledged that they’ve blocked a number of related campaigns, clarifying that this exercise stems from the misuse of a workflow automation software relatively than a compromise of their infrastructure.

Safety professionals are suggested to examine URLs rigorously, as the ultimate touchdown web page is hosted on non-official domains, and to implement strong multi-factor authentication to guard consumer accounts.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, Cloud, Google, Leversges, Logins, Microsoft, Services, Steal, Threat

Post navigation

Previous Post: Microsoft to Cancel Plans Imposing Daily Limit For Exchange Online Bulk E-mails
Next Post: Hackers Exploit Zero-Day in Discontinued D-Link Devices

Related Posts

OpenClaw v2026.2.6 Enhances Security and Model Support OpenClaw v2026.2.6 Enhances Security and Model Support Cyber Security News
Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach Akira Ransomware Allegedly Claims Theft of 23GB in Apache OpenOffice Breach Cyber Security News
CISA Warns of Oracle’s Identity Manager RCE Vulnerability Actively Exploited in Attacks CISA Warns of Oracle’s Identity Manager RCE Vulnerability Actively Exploited in Attacks Cyber Security News
Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps Malicious Chrome Extension Silently Steal and Injects Hidden SOL Fees Into Solana Swaps Cyber Security News
CISA Warns of Control Web Panel OS Command Injection Vulnerability Exploited in Attacks CISA Warns of Control Web Panel OS Command Injection Vulnerability Exploited in Attacks Cyber Security News
New DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders New DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News