Threat actors leveraged Google Apps Script to host a phishing campaign disguised as a fake invoice email, exploiting the trust users have in Google domains to steal credentials. The stolen data is then sent to attackers before victims are redirected to a legitimate Microsoft login page to avoid suspicion. #GoogleAppsScript #PhishingCampaign #CredentialTheft
Keypoints
- The phishing campaign uses Google Apps Script to host a fake invoice page, increasing perceived legitimacy.
- Attackers spoofed a legitimate disability and health equipment company’s domain to make the email appear authentic.
- The email is short and ambiguous to avoid detection by spam filters and to trigger urgency in recipients.
- Clicking the link redirects users to a fraudulent login screen designed to steal email and password credentials.
- After credential capture, victims are redirected to the genuine Microsoft login page to reduce suspicion.
- The phishing data is transmitted to attackers using a PHP script hosted on an external domain.
- IPs related to the campaign include multiple Google IP addresses and a payload server IP at 167.250.5.66.
MITRE Techniques
- [T1566] Phishing – Email containing fake invoice link hosted on Google Apps Script to trick users into entering credentials. (“…email masquerading as an invoice…link to a webpage that uses Google Apps Script…”)
- [T1192] Spearphishing Link – Redirect to a phishing site using a shortened and trusted domain to lure the victim. (“…redirected to an invoice page hosted on script.google.com…”)
- [T1056] Input Capture – Fake login window designed to collect user email and password. (“…preview button triggers a fraudulent login window…”)
- [T1071] Application Layer Protocol – Use of HTTP(S) for the data exfiltration of stolen credentials via PHP script. (“…transmits it to the attacker using a PHP script…”)
- [T1110] Brute Force – Leveraging stolen credentials to gain unauthorized access to sensitive systems (implied from credential theft). (“With the stolen credentials, attackers can infiltrate sensitive systems…”)
Indicators of Compromise
- [URL] Infection URL hosting phishing page – hXXps://script[.]google[.]com/macros/s/AKfyc…/exec?/owa/auth/logon[.]aspx
- [URL] Payload server URL transmitting stolen data – hXXps://solinec[.]com/APi/1YjDlaUXTsHrhxiufjU0fBe4d2wsameerm3wJlLX[.]php
- [IP Address] Google hosting IPs associated with phishing page – 142.251.16.106, 142.251.16.147, and 5 more
- [IP Address] Payload server IP – 167.250.5.66
Read more: https://cofense.com/blog/behind-the-script-unmasking-phishing-attacks-using-google-apps-script