Recently, the threat actors have disguised more than 25 various companies, including different brands and government offices. The cybersecurity researchers asserted that the threat actors could perform any possible way to convince that they are legitimate.
In this incident, the hackers have used 265 Google Forms in an attempt to steal user passwords and credentials.
The researchers also noticed that cybercriminals mistreat the trust people they have in the google.com domain to attract them into delivering their password and login credentials through a genuine-looking Google Form.
According to the report that has been given by the researchers, there are more than 70 percent of the sites that have been targeted by AT&T. And here we have provided the full list of targeted companies, brands, and government agencies below:-
Google Forms is a review administration app included in the Google Docs Office Suite and Classroom simultaneously with Docs, Sheets, and Slides.
Google Form for phishing has numerous other advantages:-
The researchers stated that the number of phishing websites that are using HTTPS traffic increased from 12 percent in early 2019 to nearly 60 percent now. The rise in price is because of all new phishing techniques that are appearing quite often.
However, Google Forms are very easy to perform, but at the same time, it arrives with the trust-building benefit of being hosted under the google.com domain.
The Cybersecurity recognition training guides the users to watch out for all kinds of errors or tricks that can uncover a scam. The researchers also mentioned that most of the time, cybercriminals use the company’s logo and branding to resemble themselves more legitimate.
You can follow us on Linkedin, Twitter, Facebook for daily Cyber security and hacking news updates.
In a resounding triumph for justice, U.S. District Judge Kathryn Kimball Mizelle has sentenced Vitalii…
Hackers are plotting to benefit from the generosity of Halloween, Thanksgiving, and Christmas shoppers using…
The LLMs (Large Language Models) are evolving rapidly with continuous advancements in their research and…
In the dynamic realm of mobile application security, cybercriminals employ ever more sophisticated forms of…
A recent campaign has been observed to be delivering DJvu ransomware through a loader that…
In a pivotal update to the Okta security incident divulged in October 2023, Okta Security…