Challenges of Anti-Phishing Advice, the Google Docs Edition

Published: 2012-12-19
Last Updated: 2013-07-13 01:53:06 UTC
by Lenny Zeltser (Version: 1)
8 comment(s)

Coming up with meaningful anti-phishing advice is hard, in part because even the most pragmatic tips cannot be practical in all situations. Scams where the attacker's data-collection form resides at a Google Docs (now Google Drive) are especially difficult to warn users about. After all, the malicious webpage resides at the trusted google.com domain. The effect is especially severe for organizations using Google Apps as a collaboration platform.

Using Google Docs for hosting phishing forms isn't new. F-Secure published several examples of such scams in May 2011; GFI shared additional screenshots in June 2011; Sophos outlined some examples in May 2012. 

To understand why such scams aren't going away any time soon, consider the example that came to our attention this month. The malicious email arrived with the subject "Message From I.T Service Helpdesk" and alerted the user, "Your mailbox is almost full."

Your mailbox is almost full

Recipientswho clicked the "CLICK HERE" link were directed to the following "IT HELPDESK SERVICE" page, which prompted for logon credentials that the attacker wanted to capture.

Google Docs URL

Although the landing page had a very basic look to it, it resided at the domain that most people trust: google.com. The attacker was likely using a compromised Google Apps account of another organization to create a Google Docs spreadsheet and expose its data entry form in the manner shown above.

The use of the Google domain is what lends credence to the phishing scams that make use of Google Docs. The targeted individuals can no longer rely on the advice we often give: Examine the URL bar to confirm that you are at a trustworthy site. This problem is especially severe for individuals whose organizations use Google Aps for email, calendaring and file management needs. In such cases, administrative communications are expected to come through or reside at the google.com domain.

What anti-phishing advice could we offer to potential Google Docs phishing scam victims? There's the more general suggestion of being vigilant and looking out for anomalies, be they an unusual signature line in the email message or an unexpected look-and-feel of the web page. A more specific recommendation might be: Avoid clicking on email links when you need to take important actions that require logging in. Relying on a previously-saved bookmark is safer.

Is that practical advice? Not for all situations. This is what makes anti-phishing advice so challenging to provide.

-- Lenny Zeltser

Lenny Zeltser focuses on safeguarding customers' IT operations at NCR Corp. He also teaches how to analyze malware at SANS Institute. Lenny is active on Twitter and . He also writes a security blog.

Keywords:
8 comment(s)

Comments

There have been so many of these "your mailbox is..." phishes that our users send us the real ones from our Exchange server to ask if they are phish. I think that's part of the cost of doing business these days. We strongly encourage our users to forward us any email they think is phish/scam. On the plus side, we get early warning on the ones that have made it through the filters. On the minus side we get a lot of junk forwarded to us. I think it's worth it if it helps us catch a killer phish...
Oh, I forgot. The nice thing about the Google Doc's phishes is that Google has an easy link on every page for reporting them. I hate the ones from .ua, etc because they aren't so easy to shut down.
Another complication with Google Apps as phish dropbox is that it runs over https. Unless you're going to SSL-MITM all of Google, this makes network forensics a lot harder.

Yes, John it's nice that Google has an abuse reporting link.

Pity that they don't actually act on abuse complaints for days... sometimes phishing forms are online for weeks following multiple complaints.

You wouldn't guess it from their web design or mailing address (Romania), but the most responsive and helpful site out there is www.123contactform.com. I typically get a response from a human within 30 minutes. Often, they'll even give you the submitted data.
In terms of user training... do as much of the following as you can get away with:

Never enter your password into any form, anywhere, or in response to a message with which you are unfamiliar. If in doubt, initial a telephone call to the help desk (don't trust an incoming call) or at least show the message to a co-worker. For IT, maximizing the use of "integrated windows authentication" and web initial sign-on systems can help tremendously. If you use Google Apps, you might have to do password sync for mobiles and other niche applications, but you should be authenticating users via SAML assertions from a web site in your domain. If you've taught your users that they need to give their password to any popup that asks for it, then that's what they'll do.
John, problem w/ reporting them is that folks have to follow the link against our advice.

Rich, difference in service response may be that Google has 300M customers against what seems like 7 billion bad guys.


dsh, good point. I normally report them myself when users forward the phish (boot-from-USB browser and all that if it looks sketchy.) I've been afraid to have the users do that.
I've struggled with this as well. I can't get technical, or I'll loose most of the users. After looking at a great many phishing emails, I boiled down the advice to 5 things:

1) Generic greeting, i.e. Dear Sir, Dear Madam, etc. If they are really a company you do business with, they’ll have your name.

2) Huh? Any email that makes you go “huh?” is to be considered suspicious. Strange things you have no knowledge of are very often lures. Don’t take the bait. I have seen a great many curious users with infected computers.

3) Some sort of threat, i.e. your account will be suspended/closed, you won’t be able to receive email, your credit card will be billed, your computer will be compromised, etc.

4) To avoid the threat, you must act right now, or at least within the next 24-48 hours.

5) The action involves either clicking on a link, opening an attachment (includes running the program in the attachment), or filling out the form and emailing it back.
One thing I begged Blizzard and Trion for the time that I played them, STOP SENDING LINKS IN EMAIL.

For end users, STOP USING LINKS IN ALL EMAIL.

If the link is 100% required, such as creating a new account. The user is (hopefully...) aware of links coming from that site. Otherwise, assume all links are tainted and navigate manually.

It is not easy advice, but it is the safest approach.

Diary Archives