Categories: Breaking NewsHacking

Hackers Abuse Google Apps flaw to run phishing campaigns

A critical flaw affecting Google Apps for Work allows hackers to run malicious phishing campaigns by abusing any website’s domain name.

A critical vulnerability affecting Google Apps for Work allows attackers to send phishing emails. The vulnerability in Google Apps for Work could be exploited to send emails by abusing any website’s domain name and run phishing campaign on the victim’s behalf.

Google Apps for Work is a suite of collaborative productivity apps that was designed to offer businesses a collection of professional tools, including email, shared calendars, online document editing and storage, video meetings, and much more.

Every user that has a corporate email address, that appears like admin@yourdomain.com instead of myemail@gmail.com, can register an account with Google Apps for Work. To get a custom domain name based email service from Google, the user just needs to sign up like a normal Gmail account. Once created, the user can access his domain’s admin console panel on Google app interface, but he cannot be able to use any service until he will complete domain verification process adopted by Google.

The cyber security researchers Patrik Fehrenbach and Behrouz Sadeghipour discovered  that an attacker can register any unused (not previously registered with Google apps service) domain, example: mynewco.com with Google apps for Work to open the ‘admin@mynewco.com‘ account.

“Last month, we were able to report a vulnerability to Google where we were able to  email from any domain that has not been claimed by its owner previously. For example, using google itself as a victim, we were able to claim domains such as ytimg.com and gstatic.com.” states a blog post from published by the researchers.

The account could be used only after that Google has verified the domain though the “Verify domain ownership” process:

“Before your organization can use Google services like Gmail with your company’s domain, you’ll need to verify that you own it. This ensures that no one else can use services or send email that appears to come from your company.” states Google

The two researchers explained to the The Hacker News that there is a page on Google apps that allows domain administrator to send ‘Sign in Instructions’ to the company users i.e. info@mynewco.com (must be created from panel before proceeding) by simply accessing following URL:

https://admin.google.com/EmailLoginInstructions?userEmail=info@mynewco.com

By using the online email editor, an attacker could send any kind of phishing email containing malicious links to the target users. The technique could be effective to steal sensitive information including web service credentials.

In the example provided by the colleagues at TheHackerNews, before the vulnerability was fixed, the researchers obtained admin@vine.com and sent an email to the victim, reporting the following subject:

Welcome to Twitter, which can convince users into submitting their Twitter credentials to the given phishing pages.

 

After the duo reported the flaw in Google Apps for Work to Google, the company immediately patched it, anyway the experts explained that the fix is just partial. According to the two researchers, in fact, the attacker is still able to access ‘Send Sign in Instructions’ for unverified domains, but this time via apps-noreply@google.com, instead of the custom email address.

“However you can still claim any domain and have access to the admin console through out the “validation process” and that is by design.” continues the post.

This means that victims will receive email from apps-noreply, but evidently the measure is not satisfactory.

“Google believes that showing the sender as apps-noreply is good enough.”  Behrouz told The Hacker News,

It’s clear that by abusing of this Google Apps vulnerability, phishers could send phishing emails avoiding Google detection because the mail is sent by the servers of the company.

Pierluigi Paganini

(Security Affairs –  Google Apps vulnerability, Google Apps for Work)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

DragonForce operator chained SimpleHelp flaws to target an MSP and its customers

Sophos warns that a DragonForce ransomware operator chained three vulnerabilities in SimpleHelp to target a…

8 hours ago

Russia-linked APT Laundry Bear linked to 2024 Dutch Police attack

A new Russia-linked APT group, tracked as Laundry Bear, has been linked to a Dutch…

15 hours ago

Nova Scotia Power confirms it was hit by ransomware attack but hasn’t paid the ransom

Nova Scotia Power confirms it was hit by a ransomware attack but hasn't paid the…

22 hours ago

Crooks stole over $200 million from crypto exchange Cetus Protocol

Cetus Protocol reported a $223 million crypto theft and is offering to drop legal action…

23 hours ago

Marlboro-Chesterfield Pathology data breach impacted 235,911 individuals

SafePay ransomware hit Marlboro-Chesterfield Pathology, stealing personal data of 235,000 people in a major breach.…

1 day ago

China-linked APT UNC5221 started exploiting Ivanti EPMM flaws shortly after their disclosure

China-linked APT exploit Ivanti EPMM flaws to target critical sectors across Europe, North America, and…

2 days ago