Campaign for the use of Google Services in the account …

The Nobe 4 has revealed a large -scale fraud campaign to use Google services to send cheating emails to Facebook users, and aims to steal entry data and bilateral verification codes (2 FA) and the symbols of user sessions.

Add an ad

According to a report by the company that specializes in web security, Pirates uses Google Apps, which are apps for creating applications for web and smartphones, and the campaign depends on the “workforce” feature in the Appsheet, which allows you to send messages from the legal email to (Email protected).

This technology enables you to violate security settings such as Microsoft 365 and Secure Email Gates (SEGs) based on Domain’s reputation (which evaluate the amount of confidence in domain – the name of the website – based on its efficiency record) and certified achievements such as SPF, DKIM and DMARC.

News

News appears to be sent from Facebook -owned “Mitta”, and there are false alerts for violating intellectual property rights, and users warn that their accounts are affected within 24 hours.

When you press the button, the user will be converted to a fake side, which accurately simulates the login page on Facebook because his data must be entered, including the bilateral verification code.

This information is considered directly through the fraud site, which works to review Facebook servers as a mediator, and allows the attackers to get the “session token” so that the password has changed later.

Campus

The report pointed out that the news was widely sent to the total mail, and in every message was the Kodi Farid’s identifier created by the option, which allowed traditional revelation systems. In this way, the attackers can avoid the forms to explore the messages or rely on relying.

Sending the “wrong password” decision after the first entry attempt is to insist that the user has made a mistake, although the data is correct, and re -entry, which gives the attackers a large amount of determination that the collected data is correct.

The campaign conducted its fraudulent pages on the well -known hosting service in the developer community, which gave us more credibility to the campaign in front of users’ eyes.

The announcement 4 explained that the use of reliable services provides false justice to fraudulent news and increases the chances of the success of the attack.

On April 20, 2025, the campaign reached its climax, which was sent to 10.88% of all electronic construction news that day, 4, 98.23% sent to meta users, and the remaining percentage was sent to PayPal users.

Preventive recommendations

Although researchers have suggested the number of precautionary measures to reduce these threats, it is advisable to check the source of the message to be verified before the sender’s email address before taking any action, and not to click on suspicious connections and not contact any links or buttons.

Depending on artificial intelligence, they recommend the need to use smart security solutions that training to find construction efforts, and take care of fraudulent news. According to the Bloomberg website, users must contact skilled officials or technical support groups to report suspicious messages.

Source link

Related Articles

Back to top button