The Cofense Phishing Protection Middle has uncovered a extremely strategic phishing marketing campaign that leverages Google Apps Script a professional growth platform inside Google’s ecosystem to host misleading phishing pages.
This assault, masquerading as an bill electronic mail, exploits the inherent belief customers place in Google’s trusted atmosphere to trick recipients into divulging delicate info.
A Refined Phishing Marketing campaign
By embedding malicious content material inside a good area like script[.]google[.]com, menace actors craft an phantasm of authenticity that bypasses typical suspicion, making this a very insidious type of social engineering.

This marketing campaign underscores the rising sophistication of cybercriminals who’re more and more weaponizing instruments from trusted tech giants to execute their schemes.
In response to the Cofense Phishing Protection Middle Report, The assault begins with a seemingly innocuous electronic mail, spoofing the area of a professional firm dealing in incapacity and well being tools, presenting itself as an pressing bill.
The minimalistic design and ambiguous content material of the e-mail are deliberate, aiming to evoke stress or curiosity and immediate recipients to click on on the embedded hyperlink with out hesitation.
How the Assault Unfolds and Exploits Belief
Brief emails like these are much less prone to set off spam filters or reveal errors which may in any other case expose the rip-off.
Upon clicking the hyperlink, victims are directed to a pretend bill web page hosted on Google’s platform, the place a refined “Preview” button entices additional interplay.

Clicking this button unveils a fraudulent login window, meticulously crafted to imitate a professional authentication portal.
The usage of Google’s area instills a false sense of safety, exploiting the mindset of “it’s Google, so it have to be secure,” which attackers depend on to reap electronic mail credentials and passwords.
As soon as entered, these credentials are captured by way of a PHP script and transmitted to the attacker, after which the consumer is seamlessly redirected to a real Microsoft login web page to keep away from suspicion.
This redirection tactic is a intelligent transfer to delay detection, probably permitting attackers to infiltrate delicate methods, resulting in information breaches or monetary losses.
The marketing campaign exemplifies how professional platforms might be repurposed for malicious intent, blurring the traces between secure and unsafe digital interactions.
It highlights the crucial want for heightened vigilance, as even trusted domains can function conduits for cybercrime.
Organizations should prioritize worker training on recognizing such threats and undertake sturdy phishing detection options like Cofense’s Managed Phishing Detection and Response (MPDR) to counter these evolving ways in real-time.
Indicators of Compromise (IOC)
Sort | Particulars |
---|---|
An infection URL | hXXps://script[.]google[.]com/macros/s/AKfyc…/exec?…outlook[.]office365[.]com/Encryption/msi2auth64 |
An infection IPs | 142.251.16.106, 142.251.16.147, 142.251.16.104, 142.251.16.105, 142.251.16.99, 142.251.16.103 |
Payload URL | hXXps://solinec[.]com/APi/1YjDl_aUXTsHrhxiufjU0fBe4d2wsameerm3wJl_LX[.]php |
Payload IP | 167.250.5.66 |
Discover this Information Attention-grabbing! Comply with us on Google Information, LinkedIn, & X to Get Instantaneous Updates!