Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Leverage Google Apps Script To Host Phishing Websites

Posted on May 31, 2025May 31, 2025 By CWS

Cybercriminals have escalated their techniques by exploiting Google Apps Script, a trusted improvement platform, to host subtle phishing campaigns that bypass conventional safety measures.

This rising menace represents a major shift in how attackers leverage reliable infrastructure to boost the credibility of their malicious operations.

The most recent marketing campaign targets unsuspecting customers by way of misleading bill emails that seem to originate from reliable incapacity and well being gear suppliers.

These fastidiously crafted messages comprise minimal content material to keep away from triggering spam filters whereas creating urgency that prompts speedy motion from recipients.

The attackers intentionally exploit the inherent belief customers place in communications that seem business-related and time-sensitive.

Cofense analysts recognized this subtle phishing operation by way of their Phishing Protection Heart, revealing how menace actors have weaponized Google’s personal infrastructure to create an phantasm of authenticity.

By internet hosting malicious content material on script.google.com domains, attackers successfully circumvent many safety options that sometimes whitelist Google providers, making detection considerably tougher for each automated methods and finish customers.

The marketing campaign’s impression extends past easy credential theft, as profitable assaults present cybercriminals with entry to company e-mail methods and delicate organizational information.

The usage of Google’s trusted setting dramatically will increase the chance of profitable compromise, as customers are conditioned to belief Google-hosted content material with out scrutiny.

Multi-Stage An infection Mechanism

The assault unfolds by way of a fastidiously orchestrated sequence designed to maximise sufferer engagement whereas minimizing suspicion.

E-mail Physique (Supply -Cofense)

Preliminary an infection begins when recipients click on the “View Bill” hyperlink within the spoofed e-mail, which redirects them to a Google Apps Script-hosted web page displaying what seems to be a reliable digital fax obtain interface.

Pretend Bill Web page (Supply -Cofense)

The essential transition happens when customers click on the “Preview” button, triggering the deployment of a fraudulent login window that mimics genuine Microsoft authentication interfaces.

Phishing Web page (Supply -Cofense)

As soon as credentials are entered, a PHP script instantly captures and transmits the info to attacker-controlled servers earlier than seamlessly redirecting victims to a reliable Microsoft login web page to keep up the deception.

Remaining redirect web page (Supply -Cofense)

This last redirection serves as psychological camouflage, leaving victims unaware that their credentials have been compromised whereas offering attackers with speedy entry to company methods and delicate info.

Have fun 9 years of ANY.RUN! Unlock the total energy of TI Lookup plan (100/300/600/1,000+ search requests), and your request quota will double.

Cyber Security News Tags:Actors, Apps, Google, Host, Leverage, Phishing, Script, Threat, Websites

Post navigation

Previous Post: Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection
Next Post: U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

Related Posts

Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users Cyber Security News
Cloud Misconfigurations The Silent Threat to Data Security Cyber Security News
Denodo Scheduler Vulnerability Let Attackers Execute Remote Code Cyber Security News
Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Cyber Security News
Zero Trust Architecture Building Resilient Defenses for 2025 Cyber Security News
New Crocodilus Malware That Gain Complete Control of Android Device Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News