A clever use of
Google Translate fools victims into believing spoofed authentication requests
are being handled by Google itself.
Compromising credentials are the number one staple in any cybercriminal’s book of activities, according to the Verizon Data Breach Investigation’s Report. A new phishing scam uses Google Translate to hide a spoofed logon page when asking a user for their Google credentials. The user is sent a supposed Google Security Alert about a new device accessing their Google account with a “Consult the Activity” button to find out more.
Compromising credentials are the number one staple in any cybercriminal’s book of activities, according to the Verizon Data Breach Investigation’s Report. A new phishing scam uses Google Translate to hide a spoofed logon page when asking a user for their Google credentials. The user is sent a supposed Google Security Alert about a new device accessing their Google account with a “Consult the Activity” button to find out more.
The user is then taken to a spoofed
Google logon page (shown below).
{ Click on images to view larger }
The kicker is that instead of seeing the mediacity.co URL, the cybercriminals use Google Translate to display the page, taking advantage of the random text Google uses, filling up the URL bar and obfuscating the malicious domain.
This type of campaign, given the specific execution, seems rather well-thought out. As long as the victim has a Google account and does not check the from address in the original email, there’s a solid likelihood they will fall prey to this scam, providing their Google credentials.
Google has since blocked the site, but a good reminder to be alert of scams like this.
Cybercriminals are constantly looking
for new ways to compromise both online and on-premises credentials - as they
provide the means to access data, applications, and resources useful to further
a criminal campaign. Organizations need to educate users with Security Training to
be watchful for phishing and online scams, providing detail on what to look
for, and how to avoid becoming a victim.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.