Phishing in a Bucket: Utilizing Google Firebase Storage
Credential phishing is a real threat that's targeting organizations globally. Threat actors are finding smart and innovative ways to lure victims to covertly harvest their corporate credentials. Threat actors then use these credentials to get a foothold into an organization to further their malicious agendas.
We recently observed a series of unique phishing campaigns targeting our global customers. While these campaigns used common phishing lures, what made them unique was the adoption of Google firebase storage URLs embedded in the phishing messages. In effect, actors leverage the repute and services of Google Cloud’s infrastructure to host their phishing credential harvesting pages.
Google Firebase is a mobile and web application development platform. Firebase Storage is backed by Google Cloud Storage and provides secure file uploads and downloads for Firebase apps. Using the firebase storage API one can store data in a Google Cloud Storage bucket which is a storage solution with high availability and global redundancy.
This phishing campaign although low in volume seems to be targeting a range of industries, as well as being detected by our spam traps. Some exemplar phishing messages used in this campaign are illustrated here. The major themes include payment invoice, upgrade email account, release pending messages, verify account, account error, change password, etc.
While the phishing messages seem quite convincing, some subtle imperfections exist such as variation in font and poor graphics, etc.
In subsequent iterations we observed the phishing scope expand from fake Microsoft Office 365 emails to fake bank emails as illustrated here.
The final credential phishing landing pages hosted on the Google cloud storage platform and accessed via the firebase storage URLs are illustrated here. Most of these pages are variants of the Microsoft Outlook and Office 365 phishing pages, mainly designed to harvest corporate credentials.
Phishing is a real threat targeting corporates and individuals alike. Cybercriminals are constantly evolving their techniques and tools to covertly deliver their messages to unwitting victims. Credentials harvested as a result of phishing are often used as an initial trigger for launching various types of advanced attacks. In this campaign, threat actors leverage the reputation and service of the Google Cloud infrastructure to conduct phishing by embedding Google firebase storage URLs in phishing emails. This campaign is yet another example of the bad guys using cloud infrastructure to host their phishing pages.
Trustwave Secure Email Gateway (SEG) detects these phishing messages. We advise all users to be careful before clicking on any URLs and check their browser’s address bar before submitting credentials to any login form.
- hxxps://firebasestorage[.]googleapis[.]com/v0/b/greatwebmails.appspot.com/o/mndaass%2Findex.html?alt=media&token=1c5e6903-1a39-45a8-a269-e1f7f8ae5a58# email@example.com