Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leverage Google Apps Script To Host Phishing Websites

Posted on May 31, 2025May 31, 2025 By CWS

Cybercriminals have escalated their techniques by exploiting Google Apps Script, a trusted improvement platform, to host subtle phishing campaigns that bypass conventional safety measures.

This rising menace represents a major shift in how attackers leverage reliable infrastructure to boost the credibility of their malicious operations.

The most recent marketing campaign targets unsuspecting customers by way of misleading bill emails that seem to originate from reliable incapacity and well being gear suppliers.

These fastidiously crafted messages comprise minimal content material to keep away from triggering spam filters whereas creating urgency that prompts speedy motion from recipients.

The attackers intentionally exploit the inherent belief customers place in communications that seem business-related and time-sensitive.

Cofense analysts recognized this subtle phishing operation by way of their Phishing Protection Heart, revealing how menace actors have weaponized Google’s personal infrastructure to create an phantasm of authenticity.

By internet hosting malicious content material on script.google.com domains, attackers successfully circumvent many safety options that sometimes whitelist Google providers, making detection considerably tougher for each automated methods and finish customers.

The marketing campaign’s impression extends past easy credential theft, as profitable assaults present cybercriminals with entry to company e-mail methods and delicate organizational information.

The usage of Google’s trusted setting dramatically will increase the chance of profitable compromise, as customers are conditioned to belief Google-hosted content material with out scrutiny.

Multi-Stage An infection Mechanism

The assault unfolds by way of a fastidiously orchestrated sequence designed to maximise sufferer engagement whereas minimizing suspicion.

E-mail Physique (Supply -Cofense)

Preliminary an infection begins when recipients click on the “View Bill” hyperlink within the spoofed e-mail, which redirects them to a Google Apps Script-hosted web page displaying what seems to be a reliable digital fax obtain interface.

Pretend Bill Web page (Supply -Cofense)

The essential transition happens when customers click on the “Preview” button, triggering the deployment of a fraudulent login window that mimics genuine Microsoft authentication interfaces.

Phishing Web page (Supply -Cofense)

As soon as credentials are entered, a PHP script instantly captures and transmits the info to attacker-controlled servers earlier than seamlessly redirecting victims to a reliable Microsoft login web page to keep up the deception.

Remaining redirect web page (Supply -Cofense)

This last redirection serves as psychological camouflage, leaving victims unaware that their credentials have been compromised whereas offering attackers with speedy entry to company methods and delicate info.

Have fun 9 years of ANY.RUN! Unlock the total energy of TI Lookup plan (100/300/600/1,000+ search requests), and your request quota will double.

Cyber Security News Tags:Actors, Apps, Google, Host, Leverage, Phishing, Script, Threat, Websites

Post navigation

Previous Post: Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection
Next Post: U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

Related Posts

Achieving Data Privacy Regulation Compliance in 2025 Frameworks Cyber Security News
glibc Vulnerability Exposes Millions of Linux Systems to Code Execution Attacks Cyber Security News
Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors Cyber Security News
Threat Actors Exploit ‘Prove You Are Human’ Scheme To Deliver Malware Cyber Security News
CodeSign Secure v3.02: Future of Code Signing with PQC Cyber Security News
Hackers Actively Exploiting CitrixBleed 2 Vulnerability in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Weaponized LNK File Disguised as Credit Card Security Email Steals User Data
  • How to Recognize Fake Reviews and Scams
  • Lumma Stealer Via Fake Cracked Software Steals Login Credentials and Private Files
  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News