Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Scammers Exploit Cloud Storage for Phishing SMS Attacks
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Scammers Exploit Cloud Storage for Phishing SMS Attacks

Highlights

  • Scammers use trusted cloud domains for phishing SMS attacks.

  • Google Cloud Storage's features are exploited for redirection.

  • Enhanced cybersecurity measures are essential for protection.

Samantha Reed
Last updated: 3 June, 2024 - 4:15 pm 4:15 pm
Samantha Reed 11 months ago
Share
SHARE

Cybercriminals have turned to cloud storage services to host phishing sites, exploiting the static website hosting feature to store malicious HTML files. These files are included in SMS messages that bypass firewalls due to their association with trusted cloud domains. Upon clicking the link, users are redirected to legitimate-looking websites hosted on cloud storage, which then reroute them to phishing sites designed to steal personal information. Some of these scams even impersonate well-known platforms like bank login pages to deceive unsuspecting users.

Contents
Techniques and ExploitsImplications and Countermeasures

Google Cloud Storage, launched in 2010, is a service that allows users to store and access data on Google’s infrastructure. It enables users to create “buckets” where they can upload and manage files. The service supports advanced features like static website hosting, which can be manipulated by criminals for malicious purposes. By leveraging the “HTML meta refresh” technique, attackers can automatically redirect users to different web pages with little to no delay, making it easier to execute phishing attacks.

Reports from earlier this year indicated a rise in phishing attacks using cloud services like Amazon AWS and IBM Cloud. These attacks employed similar tactics, using trusted domains to appear legitimate and bypass security filters. Recent incidents have shown a broader scope, with a significant increase in SMS-based phishing schemes. Attackers continuously adapt, making it difficult for traditional security measures to keep pace.

Comparatively, previous scams heavily relied on email spam and fake websites hosted on lesser-known domains. However, the shift toward using well-established cloud services has increased the credibility and success rate of phishing attempts. The trusted nature of these domains lulls users into a false sense of security, making them more likely to click on malicious links.

Techniques and Exploits

Attackers create buckets on Google Cloud Storage, such as “dfa-b,” to host malicious HTML pages like “dfmc.html.” These pages utilize the “meta refresh” tag to instantly redirect users to another URL, typically a phishing site. This method effectively bypasses security measures because the initial link appears to come from a reputable cloud provider.

Implications and Countermeasures

Cybersecurity experts warn that the growing trend of using cloud storage for phishing attacks poses a significant threat. While cloud providers like Google, Amazon, and IBM have robust security measures, the inherent trust in their domains makes these phishing attempts more convincing. Organizations and individuals need to remain vigilant and employ additional security measures to protect against these evolving threats.

– Key Inferences:

  • Phishers leverage trusted cloud domains to bypass security filters.
  • Instant redirection techniques enhance the effectiveness of phishing attacks.
  • Users are more likely to trust links from reputable cloud services.

The exploitation of cloud storage for phishing attacks underscores the need for enhanced cybersecurity measures. Users should be cautious of links in unsolicited SMS messages, even if they appear to come from reputable cloud services. Employing multi-factor authentication and staying informed about common phishing tactics can significantly reduce the risk of falling victim to these scams. Additionally, cloud providers must continually update their security protocols to detect and mitigate such activities effectively. It’s a collective effort between service providers and users to ensure a safer digital environment.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Google Targets Vulnerabilities in May Security Update

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Foresight Partners with KONEC for Autonomous Vehicle Concept
Next Article Google Tests New Chrome Feature for iOS Users

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Mazda Partners with Tesla for Charging Standard Shift
Electric Vehicle
Trump Alters AI Chip Export Strategy, Reversing Biden Controls
AI
Solve Wordle’s Daily Puzzle with These Expert Tips
Gaming
US Automakers Boost Robot Deployment in 2024
Robotics
Uber Expands Autonomy Partnership with $100 Million Investment in WeRide
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?