Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A new phishing scam uses Google images and shortened WhatsApp links
Global Security

A new phishing scam uses Google images and shortened WhatsApp links

AdminBy AdminAugust 8, 2024No Comments3 Mins Read
Phishing Scam
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 8, 2024Ravi LakshmananNetwork Security / Cloud Security

Phishing scam

Cybersecurity researchers have discovered a new phishing campaign that uses Google Drawings and shortened links created via WhatsApp to avoid detection and trick users into clicking fake links designed to steal sensitive information.

“The attackers chose a group of the most prominent websites in computing to create the threat, including Google and WhatsApp to host the attack elements, and an Amazon lookalike to collect the victim’s information,” Menlo Security researcher Ashwin Vamshi said. “This attack is a great example of life at the expense of trusted sites (a lot) threat”.

The starting point of the attack is a phishing email that directs recipients to a graphic that looks like an Amazon account verification link. This graphic, for its part, is hosted on Google Drawings, in an apparent attempt to avoid detection.

Cyber ​​security

Abusing legitimate services has the obvious benefit to attackers in that they are not only a low-cost solution, but more importantly, they offer a stealthy way to communicate within networks as they are unlikely to be blocked by security products or firewalls.

“Another thing that makes Google Drawings attractive at the beginning of an attack is that it allows users (in this case, the attacker) to include links in their graphics,” Vamshi said. “Such links can easily go unnoticed by users, especially if they feel a sense of urgency around a potential threat to their Amazon account.”

Users who end up clicking on the verification link are taken to a similar Amazon login page where the URL is sequentially generated using two different URL shorteners – WhatsApp (“l.wl(.)co”) followed by comes qrco(.)de – – as an additional layer of obfuscation and spoofing the security of URL scanners.

The fake page is designed to collect credentials, personal information and credit card details, after which victims are redirected to the original fake Amazon login page. As an additional step, the web page becomes unreachable from the same IP address after the credentials are verified.

The disclosure comes after researchers discovered a loophole in Microsoft 365’s anti-phishing mechanisms that could be abused, increasing the risk of users opening phishing emails.

Cyber ​​security

The method involves using CSS tricks to hide the “First Contact Safety Tip” that warns users when they receive emails from an unknown address. Microsoft, which acknowledged the problem, has yet to release a fix.

“First-contact security advice is added to the body of an HTML email, which means you can change how it’s displayed using CSS style tags,” – Austrian cybersecurity service Certitude. said. “We can go even further and fake the icons that Microsoft Outlook adds to encrypted and/or signed emails.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.