The Cofense Phishing Protection Middle has uncovered a extremely strategic phishing marketing campaign that leverages Google Apps Script a respectable improvement platform inside Google’s ecosystem to host misleading phishing pages.
This assault, masquerading as an bill e-mail, exploits the inherent belief customers place in Google’s trusted surroundings to trick recipients into divulging delicate data.
A Subtle Phishing Marketing campaign
By embedding malicious content material inside a good area like script[.]google[.]com, menace actors craft an phantasm of authenticity that bypasses typical suspicion, making this a very insidious type of social engineering.

This marketing campaign underscores the rising sophistication of cybercriminals who’re more and more weaponizing instruments from trusted tech giants to execute their schemes.
In response to the Cofense Phishing Protection Middle Report, The assault begins with a seemingly innocuous e-mail, spoofing the area of a respectable firm dealing in incapacity and well being tools, presenting itself as an pressing bill.
The minimalistic design and ambiguous content material of the e-mail are deliberate, aiming to evoke stress or curiosity and immediate recipients to click on on the embedded hyperlink with out hesitation.
How the Assault Unfolds and Exploits Belief
Quick emails like these are much less more likely to set off spam filters or reveal errors that may in any other case expose the rip-off.
Upon clicking the hyperlink, victims are directed to a faux bill web page hosted on Google’s platform, the place a delicate “Preview” button entices additional interplay.

Clicking this button unveils a fraudulent login window, meticulously crafted to imitate a respectable authentication portal.
Using Google’s area instills a false sense of safety, exploiting the mindset of “it’s Google, so it have to be protected,” which attackers depend on to reap e-mail credentials and passwords.
As soon as entered, these credentials are captured by way of a PHP script and transmitted to the attacker, after which the person is seamlessly redirected to a real Microsoft login web page to keep away from suspicion.
This redirection tactic is a intelligent transfer to delay detection, doubtlessly permitting attackers to infiltrate delicate techniques, resulting in knowledge breaches or monetary losses.
The marketing campaign exemplifies how respectable platforms may be repurposed for malicious intent, blurring the traces between protected and unsafe digital interactions.
It highlights the vital want for heightened vigilance, as even trusted domains can function conduits for cybercrime.
Organizations should prioritize worker training on recognizing such threats and undertake sturdy phishing detection options like Cofense’s Managed Phishing Detection and Response (MPDR) to counter these evolving techniques in real-time.
Indicators of Compromise (IOC)
Kind | Particulars |
---|---|
An infection URL | hXXps://script[.]google[.]com/macros/s/AKfyc…/exec?…outlook[.]office365[.]com/Encryption/msi2auth64 |
An infection IPs | 142.251.16.106, 142.251.16.147, 142.251.16.104, 142.251.16.105, 142.251.16.99, 142.251.16.103 |
Payload URL | hXXps://solinec[.]com/APi/1YjDl_aUXTsHrhxiufjU0fBe4d2wsameerm3wJl_LX[.]php |
Payload IP | 167.250.5.66 |
Discover this Information Fascinating! Observe us on Google Information, LinkedIn, & X to Get Prompt Updates!