Phishers are leveraging Google Translate in their attempts to steal the login credentials for users’ Google and Facebook accounts.
Larry Cashdollar, a member of Akamai’s Security Intelligence Response Team (SIRT), received an email in early 2019 informing him that someone had accessed his Google account from a new Windows device. On his phone, the email looked relatively convincing in its condensed state. But examining the email on his laptop confirmed his suspicions: the email was fake and had originated from the suspicious sending address “facebook_secur@hotmail[dot]com.”
Curious, Cashdollar clicked on the “Consult the activity” button provided in the email. He found himself redirected to a fake Google login page. What made this page stand out is that the digital attackers had used Google Translate to load the malicious domain while displaying a legitimate Google domain in the address bar.
It’s possible this tactic could trick some computer users into supplying their Google login credentials. Even so, others would see the “mediacity” domain being translated and then recognize the login page as a fake.
If a user did supply their Google account credentials, they immediately found themselves to be the subject of a second phishing attack designed to steal their Facebook credentials.
These back-to-back attacks make the campaign unique, as Cashdollar explains in a blog post:
It isn’t every day that you see a phishing attack leverage Google Translate as a means of adding legitimacy and obfuscation on a mobile device. But it’s highly uncommon to see such an attack target two brands in the same session. One interesting side note relates to the person driving these attacks, or at the least the author of the Facebook (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/phishers-leveraging-google-translate-to-target-google-and-facebook-users/