<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>weird emails in inbox Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/tag/weird-emails-in-inbox/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/tag/weird-emails-in-inbox/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Thu, 09 Feb 2023 21:38:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>weird emails in inbox Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/tag/weird-emails-in-inbox/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Are you getting weird emails? Phishing with Google Apps Script</title>
		<link>https://goodshepherdmedia.net/are-you-getting-weird-emails-phishing-with-google-apps-script/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Tue, 09 Nov 2021 19:17:28 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[Google Apps Script]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Phishing with Google Apps Script]]></category>
		<category><![CDATA[weird emails in inbox]]></category>
		<category><![CDATA[weird emails in my inbox]]></category>
		<category><![CDATA[weird emails in your inbox]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=11468</guid>

					<description><![CDATA[Phishing with Google Apps Script Are you getting weird emails in your inbox from a gmail account or using scripts.google.com links ? https://script.google.com/marcros/s/dsfglk8xzhjqwg-0ulkj;asdgsg/exec?p1=9kb3vacgxhbmv0sajgh Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links. To steal corporate e-mail credentials from company employees, attackers must first get past the antiphishing solutions [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1 class="c-article__title" style="text-align: center;">Phishing with Google Apps Script</h1>
<h2 style="text-align: center;">Are you getting weird emails in your inbox from a gmail account or using scripts.google.com links ?</h2>
<blockquote>
<p style="text-align: center;"><span style="color: #ff0000;"><strong>https://script.google.com/marcros/s/dsfglk8xzhjqwg-0ulkj;asdgsg/exec?p1=9kb3vacgxhbmv0sajgh</strong></span></p>
</blockquote>
<div class="c-article__intro">
<p>Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.</p>
<p>To steal corporate e-mail credentials from company employees, attackers must first get past the antiphishing solutions on the company’s e-mail servers. As a rule, they use legitimate Web services so as to evade notice, and increasingly, that means Google Apps Script, a JavaScript-based scripting platform.</p>
<h2>What is Apps Script, and how do attackers use it?</h2>
<p>Apps Script is a JavaScript-based platform for automating tasks within Google’s products (e.g., creating add-ons for Google Docs) as well as in third-party applications. Essentially, it’s a service for creating scripts and running them in Google’s infrastructure.</p>
<p>In e-mail phishing, attackers use the service for redirects. Instead of inserting the URL of a malicious website directly into a message, cybercriminals can plant a link to a <em>script</em>. That way, they can bypass the mail server-level antiphishing solutions: a hyperlink to a legitimate Google site with a good reputation sails through most of the filters. As an ancillary benefit to cybercriminals, undetected phishing sites can stay up longer. That scheme also gives attackers the flexibility to change the script if necessary (in case security solutions catch on), and to experiment with content delivery (e.g., sending victims to different versions of the site depending on their region).</p>
<h2>Example of a scam using Google Apps Script</h2>
<p>All the attackers have to do is get the user to click a link. Recently, the most common pretext was a “full mailbox.” In theory, that seems plausible.</p>
<div id="attachment_40798" class="wp-caption aligncenter">
<p><img fetchpriority="high" decoding="async" class="alignnone size-large wp-image-11471" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-letter-1-1024x321.jpg" alt="" width="640" height="201" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-letter-1-1024x321.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-letter-1-400x126.jpg 400w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-letter-1-768x241.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-letter-1-1536x482.jpg 1536w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-letter-1.jpg 1841w" sizes="(max-width: 640px) 100vw, 640px" /></p>
<p id="caption-attachment-40798" class="wp-caption-text">A typical phishing e-mail using a full-mailbox scam</p>
</div>
<p>In practice, attackers are usually careless and leave signs of fraud that should be obvious even to users who are unfamiliar with real notifications:</p>
<ul>
<li>The e-mail is apparently from Microsoft Outlook, but the sender’s e-mail address has a foreign domain. A real notification about a full mailbox should come from the internal Exchange server. (Bonus sign: The sender’s name, Microsoft Outlook, is missing a space and uses a zero instead of the letter O.)</li>
<li>The link, which appears when the cursor hovers over “Fix this in storage settings,” leads to a Google Apps Script site:
<div id="attachment_40797" class="wp-caption aligncenter">
<p><img decoding="async" class="alignnone size-full wp-image-11472" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-address.jpg" alt="" width="454" height="119" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-address.jpg 454w, https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-address-400x105.jpg 400w" sizes="(max-width: 454px) 100vw, 454px" /></p>
<p id="caption-attachment-40797" class="wp-caption-text">E-mail link to Google Apps Script</p>
</div>
</li>
<li>Mailboxes do not suddenly exceed their limits. Outlook starts warning users that space is running out long before they reach the limit. To suddenly exceed it by 850MB would probably mean receiving about that much spam all at once, which is extremely unlikely.In any case, here is an example of a legitimate Outlook notification:&nbsp;
<div id="attachment_40796" class="wp-caption aligncenter">
<p><img decoding="async" class="alignnone size-full wp-image-11470" src="https://goodshepherdmedia.net/wp-content/uploads/2023/02/google-scripts-phishing-notification.jpg" alt="" width="325" height="188" /></p>
<p id="caption-attachment-40796" class="wp-caption-text">Legitimate notification about an almost full mailbox</p>
</div>
</li>
<li>The “Fix this in storage settings” link redirects to a phishing site. Although in this case, it’s a fairly convincing copy of the login page from Outlook’s Web interface, a look at the browser’s address bar reveals that the page is hosted on a counterfeit website, not in the company’s infrastructure.</li>
</ul>
<h2>How to avoid taking the bait</h2>
<p>Experience shows that phishing e-mails do not necessarily have to contain phishing links. Therefore, reliable corporate protection must include antiphishing capabilities both <a href="https://www.kaspersky.com/small-to-medium-business-security/mail-server?icid=usa_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___" target="_blank" rel="noopener">at the mail server level</a> and on <a href="https://usa.kaspersky.com/small-to-medium-business-security?icid=usa_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______" target="_blank" rel="noopener">users&#8217; computers</a>.</p>
<p>Additionally, responsible protection needs to include ongoing <a href="https://k-asap.com/en/?icid=usa_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___" target="_blank" rel="noopener">employee awareness training</a> covering current cyberthreats and phishing scams.</p>
<p>&nbsp;</p>
</div>
<div class="c-article__author-avatar"><a href="https://usa.kaspersky.com/blog/author/romandedenok/"><img loading="lazy" decoding="async" class="avatar avatar-50 photo loading alignleft" src="https://media.kasperskydaily.com/wp-content/uploads/sites/103/2020/05/27190340/Roman-Dedenok-userpic-192x192.jpg" srcset="https://media.kasperskydaily.com/wp-content/uploads/sites/103/2020/05/27190340/Roman-Dedenok-userpic-192x192.jpg 2x" alt="" width="50" height="50" data-was-processed="true" /></a></div>
<p class="c-article__author-name"><a href="https://usa.kaspersky.com/blog/author/romandedenok/">Roman Dedenok</a></p>
<p><a href="https://usa.kaspersky.com/blog/google-script-phishing/25070/" target="_blank" rel="noopener">source</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
