{"id":23086,"date":"2021-07-27T22:19:27","date_gmt":"2021-07-27T16:49:27","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/google-script-phishing\/23086\/"},"modified":"2021-07-27T22:19:53","modified_gmt":"2021-07-27T16:49:53","slug":"google-script-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/google-script-phishing\/23086\/","title":{"rendered":"Phishing with Google Apps Script"},"content":{"rendered":"<p>To steal corporate e-mail credentials from company employees, attackers must first get past the antiphishing solutions on the company\u2019s e-mail servers. As a rule, they use legitimate Web services so as to evade notice, and increasingly, that means Google Apps Script, a JavaScript-based scripting platform.<\/p>\n<h2>What is Apps Script, and how do attackers use it?<\/h2>\n<p>Apps Script is a JavaScript-based platform for automating tasks within Google\u2019s products (e.g., creating add-ons for Google Docs) as well as in third-party applications. Essentially, it\u2019s a service for creating scripts and running them in Google\u2019s infrastructure.<\/p>\n<p>In e-mail phishing, attackers use the service for redirects. Instead of inserting the URL of a malicious website directly into a message, cybercriminals can plant a link to a <em>script<\/em>. That way, they can bypass the mail server-level antiphishing solutions: a hyperlink to a legitimate Google site with a good reputation sails through most of the filters. As an ancillary benefit to cybercriminals, undetected phishing sites can stay up longer. That scheme also gives attackers the flexibility to change the script if necessary (in case security solutions catch on), and to experiment with content delivery (e.g., sending victims to different versions of the site depending on their region).<\/p>\n<h2>Example of a scam using Google Apps Script<\/h2>\n<p>All the attackers have to do is get the user to click a link. Recently, the most common pretext was a \u201cfull mailbox.\u201d In theory, that seems plausible.<\/p>\n<div id=\"attachment_40798\" style=\"width: 1851px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2021\/07\/27221936\/google-scripts-phishing-letter-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-40798\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2021\/07\/27221936\/google-scripts-phishing-letter-1.jpg\" alt=\"A typical phishing e-mail using a full-mailbox scam\" width=\"1841\" height=\"578\" class=\"size-full wp-image-23087\"><\/a><p id=\"caption-attachment-40798\" class=\"wp-caption-text\">A typical phishing e-mail using a full-mailbox scam<\/p><\/div>\n<p>In practice, attackers are usually careless and leave signs of fraud that should be obvious even to users who are unfamiliar with real notifications:<\/p>\n<ul>\n<li>The e-mail is apparently from Microsoft Outlook, but the sender\u2019s e-mail address has a foreign domain. A real notification about a full mailbox should come from the internal Exchange server. (Bonus sign: The sender\u2019s name, Microsoft Outlook, is missing a space and uses a zero instead of the letter O.)<\/li>\n<li>The link, which appears when the cursor hovers over \u201cFix this in storage settings,\u201d leads to a Google Apps Script site:<br>\n<div id=\"attachment_40797\" style=\"width: 464px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2021\/07\/27221946\/google-scripts-phishing-address.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-40797\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2021\/07\/27221946\/google-scripts-phishing-address.jpg\" alt=\"E-mail link to Google Apps Script\" width=\"454\" height=\"119\" class=\"size-full wp-image-23089\"><\/a><p id=\"caption-attachment-40797\" class=\"wp-caption-text\">E-mail link to Google Apps Script<\/p><\/div><\/li>\n<li>Mailboxes do not suddenly exceed their limits. Outlook starts warning users that space is running out long before they reach the limit. To suddenly exceed it by 850MB would probably mean receiving about that much spam all at once, which is extremely unlikely.\n<p>In any case, here is an example of a legitimate Outlook notification:<\/p>\n<p><\/p><div id=\"attachment_40796\" style=\"width: 335px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2021\/07\/27221952\/google-scripts-phishing-notification.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-40796\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2021\/07\/27221952\/google-scripts-phishing-notification.jpg\" alt=\"Legitimate notification about an almost full mailbox\" width=\"325\" height=\"188\" class=\"size-full wp-image-23091\"><\/a><p id=\"caption-attachment-40796\" class=\"wp-caption-text\">Legitimate notification about an almost full mailbox<\/p><\/div><\/li>\n<li>The \u201cFix this in storage settings\u201d link redirects to a phishing site. Although in this case, it\u2019s a fairly convincing copy of the login page from Outlook\u2019s Web interface, a look at the browser\u2019s address bar reveals that the page is hosted on a counterfeit website, not in the company\u2019s infrastructure.<\/li>\n<\/ul>\n<h2>How to avoid taking the bait<\/h2>\n<p>Experience shows that phishing e-mails do not necessarily have to contain phishing links. Therefore, reliable corporate protection must include antiphishing capabilities both <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">at the mail server level<\/a> and on <a href=\"https:\/\/www.kaspersky.co.in\/small-to-medium-business-security?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">users' computers<\/a>.<\/p>\n<p>Additionally, responsible protection needs to include ongoing <a href=\"https:\/\/k-asap.com\/en\/?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">employee awareness training<\/a> covering current cyberthreats and phishing scams.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.<\/p>\n","protected":false},"author":2598,"featured_media":23093,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2609,2610],"tags":[1862,22,1262,76,3110],"class_list":{"0":"post-23086","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-e-mail","11":"tag-google","12":"tag-outlook","13":"tag-phishing","14":"tag-scripts"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/google-script-phishing\/23086\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/google-script-phishing\/18568\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/google-script-phishing\/9286\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/google-script-phishing\/25070\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/google-script-phishing\/23081\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/google-script-phishing\/22421\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/google-script-phishing\/25708\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/google-script-phishing\/25188\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/google-script-phishing\/31108\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/google-script-phishing\/9864\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/google-script-phishing\/40795\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/google-script-phishing\/17376\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/google-script-phishing\/17836\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/google-script-phishing\/15083\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/google-script-phishing\/27110\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/google-script-phishing\/27325\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/google-script-phishing\/24129\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/google-script-phishing\/29463\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/google-script-phishing\/29255\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/23086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=23086"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/23086\/revisions"}],"predecessor-version":[{"id":23092,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/23086\/revisions\/23092"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/23093"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=23086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=23086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=23086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}