Scammers are exploiting Google Forms, a popular tool in Google Drive, to trick users into providing personal information. Users are advised to be cautious and verify the legitimacy of forms before filling them out to avoid falling victim to malicious schemes.
BazarCall attacks have evolved to use Google Forms to generate and send phishing emails disguised as payment receipts, making them appear more legitimate. The attackers create a fake transaction form using Google Forms and enable the "response receipt" option, which sends a copy of the completed form to the target's email address. As the email originates from a Google address, it bypasses email security tools. The email includes a phone number for recipients to call within 24 hours to dispute charges, adding urgency. BazarCall attacks have previously been used to gain access to corporate networks for ransomware attacks.
The BazaCall phishing scammers have started using Google Forms to enhance the credibility of their attacks. By impersonating popular subscription services like Netflix and Norton, the scammers send emails urging targets to contact a support desk to dispute or cancel a plan. In the latest attack variant, a Google Form is used to share details of the supposed subscription, with response receipts enabled to send a copy of the form to the target. The use of Google Forms and dynamically generated URLs helps bypass traditional security measures. In a separate phishing campaign, recruiters are being targeted with direct emails that lead to the More_eggs JavaScript backdoor, attributed to a financially motivated threat actor known as TA4557.