Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Fisher exploit Google and DKIM sites to send signed letters, theft of credentials
Global Security

Fisher exploit Google and DKIM sites to send signed letters, theft of credentials

AdminBy AdminApril 22, 2025No Comments5 Mins Read
Phishers Exploit Google Sites and DKIM Replay
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Fisher exploit Google sites and overheating DKIM

What was described as “extremely complex phishing attack”, threatening subjects used an unusual approach that allowed fake emails through Google infrastructure and redirect reports to fake sites that collect their powers.

“The first thing to note is that this is a real, signed electronic message-he was really sent from no- reply@google.com,”-Nick Johnson, leading developer Ethereum (ENS), – Note In a series of posts on X.

“It undergoes a DKIM signature, and Gmail reflects it without any warnings – it even puts it in the same conversation as other, legitimate safety notifications.”

The e -mail has reported future law enforcement calls from a law enforcement agencies asking for an uncertain content that is present in their Google account and calls them to click on the sites. Google (.) COM URL to “explore the case file or take protests.”

Cybersecurity

Google URL reflects the Lookalike page, which provides a legitimate Google support page and includes buttons to “download additional documents” or “viewing”. By clicking on any of the parameters that sacrifices on the Google account account page, the only difference is that it is located on Google sites.

“Sites.Google.com is an outdated product before Google is safety; this allows users to post content on Google.com, and most importantly it supports arbitrary scenarios and encloses,” Johnson said.

“Obviously, this makes the creation of the credentials of the trivial site; they just have to be prepared to download new versions when the old men abuse Google’s abuse. This helps the attackers that there is no opportunity to report the abuse of sites from the site interface.”

A reasonable aspect of the attack is the fact that Message by email Has an “signed” title on “Uillars.Google” (.) Compite the fact that it has a “sent” title with a completely unrelated domain (“fwd-04-1.fwd.privateEEMAIL”).

Fisher exploit Google sites and overheating DKIM

Malicious activity was characterized as Attack DKIMwhere the attacker first creates Google account for a recently created domain (“I@“) And then the Google Oauth app with a name that includes all the phishing message content.

“Now they are providing their Oauth applications to them” Me@… “Google account,” Johnson said. “This creates a” Safety Alert “from Google, sent to his email” Me@… “. Since Google has created an email, it is signed with a valid DKIM key and passes all checks.

The attacker then continues to send the same message from the Outlook account, keeping the DKIM signature intact and forcing the message bypassing email filters, Easydmarc reports. Further message is resumed via custom simple mail transfer protocol (SMTP) Service called jellyfish and obtained by Namecheap Private Infrastructure, which facilitates the mail transfer to the Gmail target account.

“At this point, the e -mail reaches a victim’s mailbox similar to a valid Google message, and all authentication checks indicate that the passage of SPF, DKIM and DMARC,” EASYDMARC CEO Geasim Khuhanisians – Note.

“As they called their Google account” Me@”, Gmail shows that the message was sent to” Me “above and this is a shorthand that it uses when the message is addressed to your email – avoiding another indication that can send red flags,” Johnson said.

Turning to the comments, Google told The Hacker News that he had redeemed the corrections to stop the abuse, and emphasized that the company does not ask for account account, such as passwords or one -off passwords, nor directly calling users.

Cybersecurity

“We know about this class of purposeful attack by this actor threats, and they rolled out the defense to close this abuse avenue,” Google press said. “At the same time, we call on users to accept two -factor authentication and pace that provides strong protection against similar phishing campaigns.”

The disclosure of information occurs almost nine months after the Guardio Lab disclosed Currently, the erroneous power in the protection of e -mail safety sellers that use threatening subjects to send millions of messages that are deceived by various popular companies such as Best Buy, IBM, Nike and Walt Disney, as well as authentication measures.

It also coincides with the overexertion of phishing companies that use investment in scalable vector graphics (Svg)) Format to run HTML -Code, which, in turn, redirects users to the Microsoft login form or on a fake web pioneer, which is masked as Google Voice to attract them to their credentials.

Cyberski’s Russian Cyaspersky said that since the beginning of 2025 she noted more than 4,100 phishing sheets with SVG.

“Fisher are tirelessly studying new methods to bypass revealing,” Caspersorski – Note. “They change their tactics, sometimes using the redirection of users and exacerbation of the text, and at other times, experimenting with different attachment formats. The SVG format provides the ability to introduce HTML and JavaScript code into the attackers’ images.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025

Germany closes the exp.

May 10, 2025

Google pays $ 1.375 for unauthorized tracking and biometric data collection

May 10, 2025

Ottercookie V4 adds detection of VM and Chrome, Metamask Centive Chardenties

May 9, 2025

Breaking: 7000-Delicious Proxy using iol Systems Systems

May 9, 2025

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS PATCHES DRIVERHUB RCE DISTRUCTIONS OPERATED THROUGH HTTP AND CONTROL .INI FILE

May 12, 2025

Why the exposed powers remain units – and how to change

May 12, 2025

AI fake tools used to distribute malicious software with catching, focusing 62,000+ via lure on Facebook

May 12, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.