Security News

Hackers Target Google Docs, Microsoft Sway to Steal User Credentials

Cyber security researchers have recently identified a new type of impersonation attack that is using Google file sharing and storage websites like Google Docs to trick victims into sharing login credentials.
Of the nearly 100,000 form-based attacks detected between January 1 and April 30, Google Docs were used in 65% of attacks, making up 4% of all spear-phishing attacks in the first four months of 2020, said Barracuda Networks, a leading provider of cloud-enabled security and data protection solutions.

Cybercriminals are increasingly using coronavirus as a lure to trick unfocused users by capitalising on their fear and uncertainty.

In this type of brand impersonation attack, scammers leverage file, content-sharing, or other productivity sites like or to convince victims to hand over their credentials. “The hackers are taking advantage of the heightened focus on COVID-19 to distribute malware, steal credentials, and scam users out of money.

While phishing tactics are common in nature, this is a new kind of form-based attack that our researchers have been steadily detecting throughout the beginning of the year,” said Murali Urs, Country Manager, India of Barracuda Networks.

Key Findings:

 The attackers are impersonating emails that appear to have been generated automatically by a legitimate file-sharing site such as OneDrive, taking victim to a phishing site through a legitimate file-sharing site.

  • Creating an online form using legitimate services like
  • The forms resemble a login page of legitimate service, and the link to the form is then included in phishing emails to harvest credentials.
  • These impersonation attacks are difficult to detect because they contain links pointing to legitimate websites that are often used by organizations, said researchers.
  • In the recent form-based attacks, attackers leveraged 25%, 23%, 13% and 4%
  • In comparison, Microsoft brands were targeted in 13% of attacks: (6%), (4%), and (3 %)
    The other sites used in impersonation attacks include (10 %), (4%), and (2%). All other sites made up 6% of form-based attacks.”It is now upon the businesses to establish solutions to stop the attackers from bypassing email getaways, spam filters and track suspicious IPs. Users too should be able to identify suspicious emails and report them to reduce the occurrence of such attacks,” suggested Urs.
  • (Image

Leave a Comment

Your email address will not be published.

You may also like