Description

Attackers have been observed misusing Google Cloud Storage to distribute malware through phishing campaigns. Instead of relying on suspicious or newly registered domains, they host malicious payloads on trusted Google infrastructure, making the links appear legitimate. Victims, primarily in the financial sector, receive phishing emails containing URLs that lead to files such as VBS scripts and Java-based malware. Once executed, these payloads enable remote access, data theft, and system compromise. This activity is effective because it exploits the inherent trust organizations place in well-known cloud services. Security tools often allow traffic to domains like storage.googleapis.com, reducing the likelihood of detection. Additionally, attackers continuously rotate files and URLs, making it difficult for traditional signature-based defenses to keep up. The use of compromised email accounts further increases credibility, improving the chances of user interaction and successful infection. To mitigate such threats, organizations should implement advanced email security solutions with URL inspection and sandboxing capabilities. Restricting access to cloud storage links where unnecessary and monitoring endpoint activity for suspicious script execution can help detect infections early. User awareness training is also critical to ensure employees verify links, even if they appear to come from trusted platforms. Keeping endpoint protection updated and applying strict access controls can significantly reduce exposure.