4.9 • 696 Ratings
🗓️ 28 May 2020
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, May 28th, 2020 edition of the Sansonet Storm Center's Stormcast. |
0:07.5 | My name is Johannes Ulrich. |
0:09.1 | And today I'm recording from Jacksonville, Florida. |
0:13.5 | Jan wrote up a fishing email that he received that does mimic a lot of fishing emails that I've seen lately in that the actual phishing website |
0:24.0 | is stored within Google's cloud API. Now, this limits a little bit what the attacker can do. |
0:31.2 | They can essentially just store a static HTML page with JavaScript within Google's cloud API, so they can't really run |
0:41.4 | any dynamic code. |
0:42.9 | So typically what they're doing, and that's sort of what Jan is explaining here, is that |
0:48.1 | JavaScript within the page will pick up the username and password the user entered and then send it off to another |
0:56.9 | page that actually collects the data. |
1:00.0 | In addition, the victim is then often redirected to a website that mimics the target that |
1:07.4 | originally intended to visit. |
1:09.6 | So the intent here is that the user just feels, |
1:13.4 | oh, the login failed. Let me just log in again. And they may not necessarily notice that |
1:20.4 | they actually just lost their credentials to a phishing page. Now, what's a little bit disappointing here really with a Google |
1:29.5 | cloud storage is that my experience and Jan sort of has this experience here too. It's really |
1:37.8 | hard and slow at least to take down these pages. Even reporting them from within Google Chrome, which you would think |
1:47.0 | they sort of would integrate here in their abuse process, given that this Google Cloud Storage |
1:53.6 | we're talking about, well, it can take a day and longer to have these fishing pages taken down. |
2:01.6 | Another interesting part here is that the attacker apparently did register the domain name |
2:08.6 | these emails came from. Maybe they stole it, a little bit hard to tell, but the emails were |
2:15.6 | properly decim signed and also had the right SPF records set up. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.