Remote workers bombarded with 65,000 Google-branded cyber-attacks in first four months of 2020

Google-branded sites such as storage.googleapis.com, docs.google.com, storage.cloud.google.com, and drive.google.com have been increasingly used to trick victims into sharing login credentials, according to new insight from Barracuda Networks

LONDON, 28th May 2020 – Remote workers have been targeted by up to 65,000 Google-brand impersonation attacks, according to the most recent ‘Threat Spotlight’ report from Barracuda Networks. This type of spear phishing scam uses branded sites to trick victims into sharing login credentials.

Of the nearly 100,000 form-based attacks Barracuda detected between January 1, 2020, and April 30, 2020, Google file sharing and storage websites were used in 65 per cent of attacks. This includes storage.googleapis.com (25 per cent), docs.google.com (23 per cent), storage.cloud.google.com (13 per cent), and drive.google.com (4 per cent).

In comparison, Microsoft brands were targeted in 13 percent of attacks: onedrive.live.com (6 per cent), sway.office.com (4 per cent, and forms.office.com (3 per cent). The other sites impersonated include sendgrid.net (10 per cent), mailchimp.com (4 per cent), and formcrafts.com (2%). All other sites made up 6 percent of form-based attacks.

Barracuda researchers observed that Google-brand impersonation attacks have made up 4 per cent of all spear phishing attacks in the first four months of 2020, and they expect to see this number climb, as cybercriminals have success harvesting credentials.

Steve Peake, UK Systems Engineer Manager, Barracuda Networks comments:

“Brand-impersonation spear phishing attacks have always been a popular and successful method of harvesting a user’s login credentials, and with more people than ever working from home, it’s no surprise that cyber criminals are taking the opportunity to flood people’s inboxes with these scams. The sophistication of these attacks has accelerated in recent times: now, hackers can even create an online phishing form or page using the guise of legitimate services, such as forms.office.com, to trick unsuspecting users.

“Fortunately, there are ways to protect oneself against these cyber, such as implementing multi-factor authentication steps on all log-in pages so that hackers will require more than just a password to gain access to your data. Other, more sophisticated methods of cyber protection include using email security software, such as API based inbox defence, which uses artificial intelligence to detect and block attacks.”

+ posts

Meet Stella

Newsletter

Related articles

Strategy and anticipation are key to securing against cyber threats

With technological progress comes increased security risks. Sophisticated and co-ordinated cyber groups are working every day to find potential entry points into organisations’ networks.

Raising talent attraction and retention with IT investment

To be at the centre of talent attraction and retention, businesses should make use of workplace technology that enables them to integrate collaborative, secure and sustainable measures into their operations.

How NIST started the countdown on the long journey to quantum safety

Leading the charge to develop a post-quantum cryptographic standard for organisations is the US government’s National Institute of Standards and Technology (NIST).

Overcoming economic uncertainty with cloud flexibility

Particularly for companies that jumped into the cloud headfirst, taking the time to optimise existing processes is a remarkable way to reduce infrastructure costs and free up OPEX for delivering business value.

“The need for speed” – Finding a way to unlock agility for today’s businesses 

To fully support agility, the solutions chosen will need to enshrine all the latest innovations in areas like artificial intelligence, machine learning or prescriptive analytics.

Subscribe to our Newsletter