Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Mimics Google AppSheet to Steal Login Credentials

Posted on September 10, 2025September 10, 2025 By CWS

A complicated phishing marketing campaign has emerged concentrating on Google Workspace organizations by fraudulent emails impersonating Google’s AppSheet platform.

The assault demonstrates how cybercriminals exploit legit cloud companies to bypass conventional e-mail safety measures and steal consumer credentials.

Found in September 2025, this marketing campaign represents a big escalation in social engineering ways, leveraging the inherent belief organizations place in Google’s no-code utility growth platform.

The malicious marketing campaign capitalizes on AppSheet’s widespread enterprise adoption and deep integration with Google Workspace infrastructure.

By masquerading as legit AppSheet communications, attackers efficiently circumvent e-mail authentication protocols whereas delivering convincing trademark violation notices to unsuspecting recipients.

The assault’s effectiveness stems from its abuse of genuine Google infrastructure, making detection terribly difficult for typical safety methods.

This phishing operation follows a sample of legit service abuse that safety researchers have tracked since March 2025, when comparable campaigns exploited AppSheet to impersonate Meta and PayPal companies.

Raven analysts recognized the present trademark violation marketing campaign as an evolution of those earlier ways, noting how attackers have refined their method to maximise credential harvesting success charges whereas sustaining operational safety.

The marketing campaign’s most regarding side lies in its technical sophistication and authentication bypass capabilities.

Not like conventional phishing assaults that depend on compromised or spoofed domains, this operation leverages Google’s legit e-mail infrastructure to ship malicious content material.

Messages originate from [email protected], making certain good SPF, DKIM, and DMARC authentication whereas sustaining glorious sender fame scores.

Technical Infrastructure and Supply Mechanism

The assault methodology exploits AppSheet’s legit e-mail performance by a number of potential vectors.

Attackers both compromise present consumer accounts on the platform or abuse the service’s notification methods to craft messages that seem authentically generated by Google’s infrastructure.

Phishing e-mail (Supply – Raven)

The phishing emails comprise professionally formatted content material mimicking trademark enforcement notices, full with pressing authorized compliance necessities designed to immediate instant consumer motion.

Essential to the marketing campaign’s success is its use of suspicious URL shorteners, notably goo.su domains, which redirect victims to credential harvesting websites.

These shortened hyperlinks are embedded inside in any other case legitimate-appearing authorized notifications, making a compelling pretext for consumer interplay.

The attackers strategically host their phishing infrastructure on respected platforms like Vercel, additional enhancing the operation’s credibility and evasion capabilities.

Detection proves difficult as a result of the emails go all conventional authentication checks whereas showing contextually acceptable to recipients conversant in routine AppSheet communications.

AppSheet phish breakdown (Supply – Raven)

This mix of technical legitimacy and social engineering sophistication highlights the pressing want for context-aware e-mail safety options that analyze sender-content relationships quite than relying solely on authentication protocols.

The marketing campaign underscores how legit cloud companies can grow to be weaponized assault vectors, forcing organizations to rethink basic assumptions about trusted communications in enterprise environments.

Increase your SOC and assist your staff shield your corporation with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:AppSheet, Attack, Credentials, Google, Login, Mimics, Phishing, Steal

Post navigation

Previous Post: CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
Next Post: Accessible AI-Powered Cybersecurity Platform for SME Security

Related Posts

New Crocodilus Malware That Gain Complete Control of Android Device Cyber Security News
Lessons From Salesforce/Salesloft Drift Data Breaches Cyber Security News
Threat Actors Attacking Job Seekers With Three New Unique Adversaries Cyber Security News
SafePay Ransomware Infected 260+ Victims Across Multiple Countries Cyber Security News
MuddyWater Hackers Using Custom Malware With Multi-Stage Payloads and Uses Cloudflare to Mask Fingerprints Cyber Security News
Hackers Use ClickFix Technique to Deploy NetSupport RAT via Compromised WordPress Sites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed
  • First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code
  • Top Zero-Day Vulnerabilities Exploited in the Wild in 2025
  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Heathrow and Other European Airports Hit by Cyberattack, Several Flights Delayed
  • First-ever AI-powered ‘MalTerminal’ Malware uses OpenAI GPT-4 to Generate Ransomware Code
  • Top Zero-Day Vulnerabilities Exploited in the Wild in 2025
  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
  • Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News