Tech »  Topic »  How phishing attacks are exploiting Google's own tools and services

How phishing attacks are exploiting Google's own tools and services


One of the primary challenges facing any type of cyberattack is getting past security defenses. And one way attackers manage this feat is by using legitimate services to carry out different phases of a campaign. A blog post published Thursday by cybersecurity firm Armorblox details how phishing campaigns are using some of the technologies available from Google and offers advice on how to protect yourself.

SEE: Cybersecurity: Let's get tactical (free PDF) (TechRepublic)  

In the post entitled "OK Google, Build Me a Phishing Campaign," Armorblox's co-founder and head of engineering, Arjun Sambamoorthy, explains that Google is a ripe target for exploitation due to the free and democratized nature of many of its services.

Adopted by so many legitimate users, Google's open APIs, extensible integrations, and developer-friendly tools have also been co-opted by cybercriminals looking to defraud organizations and individuals.

Specifically, attackers are using Google's own services ...


Copyright of this story solely belongs to techrepublic.com . To see the full text click HERE