{"id":18296,"date":"2021-05-07T00:16:35","date_gmt":"2021-05-06T20:16:35","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/office-365-phishing-via-gdocs\/18296\/"},"modified":"2021-05-07T00:17:07","modified_gmt":"2021-05-06T20:17:07","slug":"office-365-phishing-via-gdocs","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/office-365-phishing-via-gdocs\/18296\/","title":{"rendered":"Google Docs used for Office 365 credential phishing"},"content":{"rendered":"<p>Since the onset of the COVID-19 pandemic, many companies have moved much of their workflows online and learned to use new collaboration tools. In particular, Microsoft\u2019s Office 365 suite has seen a lot more use \u2014 and, to no one\u2019s surprise, phishing now increasingly targets those user accounts. Scammers have been resorting to all sorts of tricks to get business users to enter their passwords on a website made to look like Microsoft\u2019s sign-in page. Here is another phishing scheme that makes use of Google services.<\/p>\n<h2>Phishing letter<\/h2>\n<p>As most phishing schemes, this one begins with a letter (and link) similar to this one:<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/05\/07001646\/office-365-phishing-via-gdocs-letter.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/05\/07001646\/office-365-phishing-via-gdocs-letter.jpg\" alt=\"A phishing letter with a Google Docs link\" width=\"1425\" height=\"743\" class=\"aligncenter size-full wp-image-18297\"><\/a><\/p>\n<p>The unclear message from an unknown sender concerns some kind of deposit and includes a link having to do with \u201cDeposit Advice.\u201d The letter asks the recipient to check on the deposit type or confirm the sum. Now, although security systems alert recipients about the letter coming from outside the company, the link \u201cto the file\u201d passes muster because it connects to a legitimate Google online service, not a phishing site.<\/p>\n<h2>Phishing site<\/h2>\n<p>The link leads to a location that appears to be the OneDrive corporate service page. Users can even see that the document is available to any company user (made so likely in hopes someone will forward the link to a corporate accountant).<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/05\/07001655\/office-365-phishing-via-gdocs-onedrive.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/05\/07001655\/office-365-phishing-via-gdocs-onedrive.jpg\" alt=\"A Google Docs presentation that looks more like OneDrive's interface\" width=\"936\" height=\"530\" class=\"aligncenter size-full wp-image-18299\"><\/a><\/p>\n<p>But the screen users see is not truly a Web page; it\u2019s a slide from a Google Docs presentation that automatically opens in View mode. The Open button on it can conceal any link at all. In this case, the link connects to a phishing page disguised as an Office 365 sign-in page.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/05\/07001704\/office-365-phishing-via-gdocs-office-login.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2021\/05\/07001704\/office-365-phishing-via-gdocs-office-login.jpg\" alt=\"Fake sign-in page\" width=\"942\" height=\"787\" class=\"aligncenter size-full wp-image-18301\"><\/a><\/p>\n<h2>Red flags<\/h2>\n<p>To begin with, the letter looks weird. You should not trust \u2014 let alone forward \u2014 a letter whose source and purpose isn\u2019t clear. In this case, for example, if you weren\u2019t involved in a deposit, then perhaps you shouldn\u2019t be taking any action regarding that deposit.<\/p>\n<p>More evidence:<\/p>\n<ul>\n<li>Letters from external sources don\u2019t tend to link to a company\u2019s internal documents;<\/li>\n<li>Real financial documents are set to open for specific people, not every single person in an organization;<\/li>\n<li>The filename in the letter does not match the one allegedly stored on OneDrive;<\/li>\n<li>Google Docs does not host Microsoft OneDrive pages (see the browser address bar);<\/li>\n<li>OneDrive is not Outlook, and an <em>Open<\/em> button in OneDrive should not lead to an Outlook sign-in page;<\/li>\n<li>Outlook sign-in pages do not reside on Amazon websites (another browser address bar clue).<\/li>\n<\/ul>\n<p>Each inconsistency should raise a flag, and together, they can leave no doubt: This is not a safe place for your Office 365 credentials.<\/p>\n<h2>How to stay safe<\/h2>\n<p>The key to digital safety lies in paying attention to details and being aware of <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing tricks<\/a>. We also strongly recommend raising corporate awareness about current cyberthreats (<a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">our training is available online<\/a>).<\/p>\n<p>In addition to training staff, make use of link-screening tools at the <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/microsoft-office-365-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kso365___\" target=\"_blank\" rel=\"noopener nofollow\">corporate<\/a> and <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">workstation<\/a> levels.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Phishers are using Google online services to take over Microsoft online service accounts.<\/p>\n","protected":false},"author":2598,"featured_media":18303,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[1815,2444,38,1643,76],"class_list":{"0":"post-18296","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-e-mail","10":"tag-google-docs","11":"tag-microsoft","12":"tag-office-365","13":"tag-phishing"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/office-365-phishing-via-gdocs\/18296\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/office-365-phishing-via-gdocs\/22814\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/office-365-phishing-via-gdocs\/9095\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/office-365-phishing-via-gdocs\/24706\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/office-365-phishing-via-gdocs\/22703\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/office-365-phishing-via-gdocs\/21858\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/office-365-phishing-via-gdocs\/25255\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/office-365-phishing-via-gdocs\/24603\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/office-365-phishing-via-gdocs\/30664\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/office-365-phishing-via-gdocs\/9614\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/office-365-phishing-via-gdocs\/39828\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/office-365-phishing-via-gdocs\/16899\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/office-365-phishing-via-gdocs\/14808\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/office-365-phishing-via-gdocs\/26714\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/office-365-phishing-via-gdocs\/30649\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/office-365-phishing-via-gdocs\/27019\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/office-365-phishing-via-gdocs\/23855\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/office-365-phishing-via-gdocs\/29190\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/office-365-phishing-via-gdocs\/28987\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2598"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18296"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18296\/revisions"}],"predecessor-version":[{"id":18302,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18296\/revisions\/18302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18303"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}