Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Leverage Google Apps Script To Host Phishing Websites

Threat Actors Leverage Google Apps Script To Host Phishing Websites

Posted on May 31, 2025May 31, 2025 By CWS

Cybercriminals have escalated their techniques by exploiting Google Apps Script, a trusted improvement platform, to host subtle phishing campaigns that bypass conventional safety measures.

This rising menace represents a major shift in how attackers leverage reliable infrastructure to boost the credibility of their malicious operations.

The most recent marketing campaign targets unsuspecting customers by way of misleading bill emails that seem to originate from reliable incapacity and well being gear suppliers.

These fastidiously crafted messages comprise minimal content material to keep away from triggering spam filters whereas creating urgency that prompts speedy motion from recipients.

The attackers intentionally exploit the inherent belief customers place in communications that seem business-related and time-sensitive.

Cofense analysts recognized this subtle phishing operation by way of their Phishing Protection Heart, revealing how menace actors have weaponized Google’s personal infrastructure to create an phantasm of authenticity.

By internet hosting malicious content material on script.google.com domains, attackers successfully circumvent many safety options that sometimes whitelist Google providers, making detection considerably tougher for each automated methods and finish customers.

The marketing campaign’s impression extends past easy credential theft, as profitable assaults present cybercriminals with entry to company e-mail methods and delicate organizational information.

The usage of Google’s trusted setting dramatically will increase the chance of profitable compromise, as customers are conditioned to belief Google-hosted content material with out scrutiny.

Multi-Stage An infection Mechanism

The assault unfolds by way of a fastidiously orchestrated sequence designed to maximise sufferer engagement whereas minimizing suspicion.

E-mail Physique (Supply -Cofense)

Preliminary an infection begins when recipients click on the “View Bill” hyperlink within the spoofed e-mail, which redirects them to a Google Apps Script-hosted web page displaying what seems to be a reliable digital fax obtain interface.

Pretend Bill Web page (Supply -Cofense)

The essential transition happens when customers click on the “Preview” button, triggering the deployment of a fraudulent login window that mimics genuine Microsoft authentication interfaces.

Phishing Web page (Supply -Cofense)

As soon as credentials are entered, a PHP script instantly captures and transmits the info to attacker-controlled servers earlier than seamlessly redirecting victims to a reliable Microsoft login web page to keep up the deception.

Remaining redirect web page (Supply -Cofense)

This last redirection serves as psychological camouflage, leaving victims unaware that their credentials have been compromised whereas offering attackers with speedy entry to company methods and delicate info.

Have fun 9 years of ANY.RUN! Unlock the total energy of TI Lookup plan (100/300/600/1,000+ search requests), and your request quota will double.

Cyber Security News Tags:Actors, Apps, Google, Host, Leverage, Phishing, Script, Threat, Websites

Post navigation

Previous Post: Authorities Dismantled AVCheck, a Tool For Testing Malware Against Antivirus Detection
Next Post: U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

Related Posts

GitLab Urges Update to Fix Critical Security Flaws GitLab Urges Update to Fix Critical Security Flaws Cyber Security News
Google Drive Desktop for Windows Vulnerability Grants Full Access to Another User’s Drive Google Drive Desktop for Windows Vulnerability Grants Full Access to Another User’s Drive Cyber Security News
Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques Cyber Security News
SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers SSHStalker Botnet Exploits Weak Passwords to Target Linux Servers Cyber Security News
7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code 7-Zip Vulnerabilities Allows Remote Attackers to Execute Arbitrary Code Cyber Security News
2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain 2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems
  • Foxconn Cyberattack Impacts North American Operations
  • Foxconn Hit by Cyberattack, Confirms Data Breach
  • AI Uncovers Numerous Vulnerabilities in Tech Giants’ Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems
  • Foxconn Cyberattack Impacts North American Operations
  • Foxconn Hit by Cyberattack, Confirms Data Breach
  • AI Uncovers Numerous Vulnerabilities in Tech Giants’ Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark