Podcast Detail

SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords

If you are not able to play the podcast using the player below: Use this direct link to the audio file: https://traffic.libsyn.com/securitypodcast/9498.mp3

Podcast Logo
New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords
00:00

How Long Until the Phishing Starts? About Two Weeks
After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails.
https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052

Scammers hijack websites of Bank of America, Netflix, Microsoft, and more to insert fake phone numbers
Scammers are placing Google ads that point to legitimate companies’ sites, but are injecting malicious text into the page advertising fake tech support numbers
https://www.malwarebytes.com/blog/news/2025/06/scammers-hijack-websites-of-bank-of-america-netflix-microsoft-and-more-to-insert-fake-phone-number

What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
Targeted attacks are tricking victims into creating app-specific passwords to Google resources.
https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia

Podcast Transcript

 Hello and welcome to the Friday, June 20th, 2025
 edition of the SANS Internet Storm Center's Stormcast. My
 name is Johannes Ullrich and this episode brought to you by
 the Graduate Certificate Program in Penetration Testing
 and Ethical Hacking is recorded in Stockholm,
 Germany. One issue that keeps happening is that in
 particular new employees in organizations are being
 targeted by phishing or gift card scans. Chris Crowley, a
 SANS instructor, did set up a new Google Workspace and,
 well, pretty much within a couple of weeks, then started
 receiving phishing emails trying to target, well,
 luckily non-existing employees at that particular Google
 Workspace. These emails claimed to come from Chris,
 given that he was quantilating LinkedIn and such, the owner
 of that particular company. And, well, also interestingly,
 the from address actually then also implied some kind of
 urgency which is often what's then being used to trick new
 employees into buying, for example, gift cards, claiming
 that their new boss, that they are still trying to impress,
 is trying to basically get gift cards to give to some
 customer or the like. Definitely something that you
 want to include in awareness training early on, that
 particular new employees are specifically targeted by these
 sort of scams. And Malwarebytes has an interesting blog post
 about how Google is being abused in order to advertise
 fake tech support numbers. Now, this is a new way to
 abuse Google. We had in the past where malicious
 advertisers were basically just claiming to publish a
 tech support number for Dell or Microsoft or whoever and
 include as part of their Google ad. Now, this one is a
 little bit different. When you're clicking on the link in
 the ad, it actually goes to the legitimate webpage. So,
 for example, in Malwarebytes case, we wrote about this, if
 the attacker would place an ad for Malwarebytes. And then when
 you click on the ad, you actually end up on Malwarebytes
 website. But there is an option that advertisers can
 take advantage of. And, well, you know, usually people are
 searching for things on Google. So, what the
 advertiser is doing here that the search string the user
 clicked on, well, that one is passed to the website. So,
 what the malicious advertiser is doing now is that they pre
 -fill that search string with a string like, well, you know,
 tech support for Malwarebytes is 1800 something. And that's
 now blindly being added by the website to a search box,
 making it appear to be part of the website. Interesting
 little trick that makes it much more plausible for a
 victim to assume that this is a legitimate phone number
 because they see it on the victim's company's website.
 It's a little bit sort of like cross-site scripting, but it's
 really just plain content. There is no HTML, JavaScript,
 or anything like this involved. And Google published
 a blog post with details regarding some targeted tags
 that they have seen in order to get app-specific passwords
 from users. The problem, of course, we all have is, well,
 we all like to use two-factor authentication. But in some
 cases, two-factor authentication doesn't really
 work that well, for example, in some legacy email clients.
 The solution often has been then the use of application
 -specific passwords, which really, well, are just
 bypassing the entire multi-factor authentication
 process. Now, the advantage of these passwords is usually
 that they're system generated, so they're long random string,
 nothing the user picks. But of course, this is not phishing
 resistant. What these attacks are doing is that they are
 claiming to be a legitimate application. One of them, for
 example, was called ms.state .gov, to somehow fit into the
 profile of the targeted victim. That then tricks the
 user into obtaining an application-specific password
 and handing it to this malicious application, which
 in turn, of course, will use this application-specific
 password to then access the user's account, in particular,
 email. One misconception often about these application
 -specific passwords is that they're not only application
 -specific. The application -specific for the application
 using the password but often are providing access to the
 entire user's account, not just to specific server-side
 applications. A better option here, of course, is typically
 OAuth. But in general, even with OAuth, you have similar
 issues where users may provide OAuth credentials to malicious
 applications. So definitely review any applications that
 are linked to your account either with application
 -specific passwords or OAuth credentials from time to time.
 Well, and that's it for today. Thanks for listening. Don't
 forget it's still time to register for Science Fire. So
 thanks and talk to you again on Monday. Bye.