What’s Apps Script, and the way do attackers use it?
In e-mail phishing, attackers use the service for redirects. As an alternative of inserting the URL of a malicious web site straight right into a message, cybercriminals can plant a hyperlink to a script. That method, they’ll bypass the mail server-level antiphishing options: a hyperlink to a official Google website with a great fame sails by many of the filters. As an ancillary profit to cybercriminals, undetected phishing websites can keep up longer. That scheme additionally offers attackers the pliability to alter the script if crucial (in case safety options catch on), and to experiment with content material supply (e.g., sending victims to completely different variations of the location relying on their area).
Instance of a rip-off utilizing Google Apps Script
All of the attackers should do is get the person to click on a hyperlink. Lately, the commonest pretext was a “full mailbox.” In concept, that appears believable.
In observe, attackers are often careless and go away indicators of fraud that needs to be apparent even to customers who’re unfamiliar with actual notifications:
How one can keep away from taking the bait
Expertise exhibits that phishing e-mails don’t essentially should comprise phishing hyperlinks. Subsequently, dependable company safety should embody antiphishing capabilities each at the mail server level and on users’ computers.
Moreover, accountable safety wants to incorporate ongoing employee awareness training masking present cyberthreats and phishing scams.
https://www.kaspersky.com/weblog/google-script-phishing/40795/ | Use of Google Apps Script in phishing