Here's How Hackers Are Using Google Firebase Storage URLs to Scam People

Firebase Phishing URLs

For cybercriminals, the act of stealing users' login credentials or infecting them with malware is nothing more than business, and like any business, it presents its own set of challenges. Hackers are constantly trying to optimize their illegal operations and make them more effective. In an attempt to do that, phishing crews started using Google Firebase URLs in recent campaigns observed by researchers from Trustwave.

Phishers abuse Google’s Firebase platform to harvest login credentials

Firebase is a development platform for mobile and web applications that was acquired by Google in 2014, and it's now directly linked to the search engine giant's massive cloud storage infrastructure. The crooks realized that this makes it perfect for storing phishing pages.

According to Trustwave's researchers, the phishers have impersonated a number of different service providers and have created a number of scenarios in their emails. The goal, however, is always the same – tricking users into clicking a link in the email and leading them to a phishing page that is hosted on Firebase.

Convincing emails can catch many users off-guard

The phishers have put a lot of effort into the emails. One of the first things you can notice from the examples Trustwave posted is the distinct lack of grammatical and spelling errors that we often associate with phishing campaigns. As the researchers pointed out, the fonts and formatting are not perfect in some places, but the crooks apparently hope that their social engineering tricks will be strong enough to compensate for this.

Indeed, some of the scenarios are quite believable. As we mentioned already, the phishers aren't impersonating a single service provider, and they're not targeting a single set of users. That being said, the majority of emails appear to be aimed at employees of organizations of various sizes.

Microsoft's name is used quite extensively throughout the campaigns. In some of the attacks, the crooks try to convince the user that some emails have not been delivered because of a server migration. In others, the victim is told that certain incoming messages might have been flagged as spam erroneously and should be reviewed. In yet another campaign, the user is urged to upgrade their account so that they can use a new version of the webmail portal.

The coronavirus pandemic has also been used. One of Trustwave's screenshots shows that the crooks are trying to impersonate the accountants of the victim's employer. The user is told that they need to fill in a payment form in order to receive an outstanding payment related to the work-from-home directive. Of course, many would be able to poke holes through the scenarios dreamt up by the hackers, but it's not difficult to see how inexperienced and less tech-savvy users might fall for the scam.

Why did the crooks pick Firebase?

The remarkable characteristic of these campaigns is not the social engineering, but the use of Firebase, though. Cybercriminals often host their phishing pages on websites that they compromise beforehand. That way, they don't need to register new domains or think about setting up servers that will host the malicious login forms. Hacking a website isn't necessarily easy, though, and often, it's simply not worth the effort. As soon as security products detect malicious activity on the compromised website, the entire domain can be blacklisted, and the whole campaign could end prematurely.

By using Firebase, the phishers are taking direct advantage of Google's cloud infrastructure and its reputation. The spam filters are less likely to put Firebase URLs under direct scrutiny, and even if one page gets reported and removed, the crooks can set up another one with relative ease.

All in all, it looks like the cybercriminals have found a new way of making their attacks more streamlined and effective, and it's up to Google to counteract. Keeping criminals out of its platforms is not something new for the search engine colossus. Its experts now need to focus on Firebase as well, though.

June 3, 2020

One Comment

  • ico:

    Google should start thinking about this before the world turn against Google by filing law suits and millions of $ for damages

Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.