UPDATED 09:00 EDT / JULY 01 2021

SECURITY

PayPal phishing attack uses legitimate services to bypass Google Workspace security

A newly revealed PayPal Holdings Inc. credential phishing attack is using exploited legitimate services to target victims and bypass security services provided by Google LLC Workspace.

Detailed today by Bryan O’Neil, vice president of solutions engineering at email security firm Armorblox Inc., the attack exploits issues with PayPal integration with services from companies such as GoDaddy Inc. and Glitch in its phishing flow.

The phishing email attacks use a range of techniques to get past traditional email security features, including social engineering, brand impersonation, the use of security themes, replication of existing workflows and exploring legitimate infrastructure. The email sender domain is hosted on GoDaddy and the phishing page is created using Glitch Editor.

In a typical case, the email claims to come from PayPal and has a “No-Reply PayPal” as the sent name. The message subject is “New Message from Pay-pal security team.” The grammatical errors should immediately cause suspicion, but the email also claims that the victim’s PayPal profile is incomplete because of an expired credit or debit card or a change in physical address.

The domain of the email sender is securesever dot net, which is hosted by GoDaddy. After clicking “Restore Account Access,” victims are taken to a phishing page that resembles the PayPal login portal. The page asks victims for their email or mobile number and PayPal account password.

Phishing attacks are not new, but O’Neil claims that this campaign gets interesting in that the emails are getting past Google Workspace email security. Google Workspace email security is claimed to offer advanced phishing and malware protection and is designed to meet “stringent privacy and security standards based on industry best practices.”

O’Neil recommends that companies augment native email security, including additional controls with layers that take a materially different approach to threat detection. Simple personal detection is also noted as important as a simple eye test, in this case, could have found that the phishing emails were suspicious.

In addition, O’Neil also notes that using multifactor authentication and password management best practices is a must. For example, MFA on all personal and business accounts provides a layer of security against phishing and other malicious attacks. And people shouldn’t use the same password on multiple sites.

Image: Armorblox

A message from John Furrier, co-founder of SiliconANGLE:

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.
About SiliconANGLE Media
SiliconANGLE Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of SiliconANGLE, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — SiliconANGLE Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, SiliconANGLE Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.