Description

Cybersecurity researchers have now discovered two sophisticated phishing campaigns that make use of trusted platforms, Firebase and Google Apps Script, to distribute malware and harvest sensitive data. In the first case, revealed by Trellix, the attackers impersonated an employee of Rothschild & Co to target financial executives in various regions worldwide. Victims received spear-phishing emails with a hostile link to a brochure hosted on Firebase, masquerading behind a math CAPTCHA. Decoding it triggered the download of a ZIP file containing a script that installed NetBird and OpenSSH, created a hidden admin account, and gave remote access. Separately, Cofense revealed a phishing campaign exploiting Google Apps Script, with fake invoice emails pointing to spoofed Microsoft login pages hosted within Google's ecosystem Such campaigns try to evade traditional security measures by exploiting popular and trusted services. Firebase and Google Apps Script are widely used by developers and organizations, thus traffic to such sites will be harmless to users as well as to majority security solutions. By hosting the malicious content on such sites, attackers exploit the inherent trust users have for popular tech giants like Google, significantly increasing the success rate of phishing campaigns. The campaigns also appear more sophisticated with multi-step infection chains and convincing-looking user interface clones. In order to counter such attacks, organizations need to strengthen their email security filters and use sophisticated threat detection software that can detect anomalies even on trusted platforms. User consciousness is also vital, employees can be trained to recognize fake links and attachments even from known domains, which can minimize the risk. Periodic security audits and the use of endpoint protection software can also protect systems from persistent threats.