"Cyberattackers Spoof Google Translate in Unique Phishing Tactic"

Attackers are spoofing Google Translate in an ongoing phishing campaign that bypasses email security scanners by using a common JavaScript coding technique. According to researchers, the reliance on Google Translate is a novel approach. The campaign was discovered by researchers from Avanan, who used the coding technique to obfuscate phishing sites in order to make them appear legitimate to end users and deceive security gateways. The phish also employs social engineering tactics to convince users that they must respond quickly to an email or risk having their accounts closed. The messages direct users to a link that takes them to a credential-harvesting page that appears to be a legitimate Google Translate page, complete with a pre-populated email field that only requires a user's password to log in. According to Jeremy Fuchs, an Avanan cybersecurity researcher and analyst, the campaign is an example of several current, increasingly sophisticated tactics that threat actors are using in contemporary phishing campaigns to fool both savvier end users who have become familiar with malicious tactics, as well as email scanners that delete suspicious messages. This article continues to discuss the new credential-stealing campaign involving a combination of tactics and a common JavaScript obfuscation technique to fool end users and email security scanners.

Dark Reading reports "Cyberattackers Spoof Google Translate in Unique Phishing Tactic"

Submitted by Anonymous on