A sophisticated phishing scam has recently come to light, leveraging Google Drawings and shortened links via WhatsApp to trick users into disclosing sensitive information. Researchers have identified this campaign as a prime example of a Living Off Trusted Sites (LoTS) threat. The attack begins with a phishing email that directs recipients to a Google Drawings-hosted graphic, which masquerades as an Amazon account verification link. By using Google Drawings, attackers exploit a legitimate platform to embed deceptive links that evade traditional security filters.
Once users click on the fraudulent verification link, they are redirected to a counterfeit Amazon login page. To further obscure the malicious nature of the link, attackers employ two URL shorteners: WhatsApp (“l.wl[.]co”) and qrco[.]de. This double-layer of obfuscation helps the phishing page bypass security scanners that might otherwise detect suspicious URLs. The fake login page is designed to harvest users’ login credentials, personal information, and credit card details. After the information is captured, victims are redirected to the real Amazon login page, and the phishing site becomes inaccessible from the same IP address to avoid further detection.
The emergence of this phishing scam is accompanied by a newly identified vulnerability in Microsoft 365’s anti-phishing defenses. Researchers have found that CSS tricks can hide the “First Contact Safety Tip,” which alerts users to emails from unknown addresses. This loophole diminishes the effectiveness of this security feature, making it easier for phishing emails to bypass Microsoft’s protective measures. Although Microsoft has acknowledged the issue, a fix has not yet been released, leaving users at increased risk.
This latest phishing attack underscores the need for continued vigilance and advanced security practices. As attackers increasingly exploit legitimate services and sophisticated techniques, it is crucial for users to remain cautious and for organizations to implement robust security measures. Enhanced email filtering, user education, and updated security protocols are essential to combating these evolving threats and protecting sensitive information from falling into the wrong hands.
Reference: