Phishing with Google Calendar

渗透技巧 1年前 (2022) admin
337 0 0
Phishing with Google Calendar
Disclaimer

The following information is for educational purposes only. This post is intended for Red Teams, Penetration Testers, and Blue Teams looking to secure their orginizations. DO NOT use any of the following techniques maliciously or without the explicit permission of all those involved.

Background

For many organizations using G-Suite, the default setting on company Google accounts is set to allow anyone to place a meeting invite onto employee’s calendars. This setting therefore allows an external attacker (using an external Gmail account) to send a malicious meeting invite and have it magically appear on an employee’s calendar.

The following phishing technique utilizes Google Calendar as the delivery mechanism for a malicious link. This malicious link is disguised to look like something many of us are familiar with clicking numerous times a day: a Zoom meeting link. The most important aspect of this attack is that by using Google Calendar to deliver our attack, we are able to circumvent many common security controls, such as email filters and spoofing protections. When paired with a MITM tool such as Evilginx2, this technique can be devestating to an organization.

Phishing with Google Calendar

Proof of Concept

1. Login to a Google account and create a new meeting on your Google Calendar. Choose a title for your meeting that will create a sense of urgency.

Phishing with Google Calendar2. Now add the email address you wish to send your phishing attack to, make sure to deselect the ‘Guest Permission’ that allows guests to invite others and to see the guest list. This will ensure that the target can not see that they are the only person invited to this meeting and will obfuscate your malicious email address.

Phishing with Google Calendar3. Now in the description section of your new meeting, select the ‘insert link’ tab and enter a convincing fake zoom link. In the second input, enter the url of your malicious link (example: evilginx2 url that is set up to MITM the target’s SSO signin page).

Phishing with Google Calendar4. Once your malicious hyperlink is created, now add fake text to the description to look like a legitimate zoom meeting invitation. For example, the name of the person you’re impersonating (boss or executive), fake meeting ID, passcode, and a long list of fake phone numbers. (It’s important to have long list of text here, because this will obfuscate the malicious email address that is sending the meeting invite. I will include an example later on)

Phishing with Google Calendar5. In order to make this technique work, we want to send the target the meeting invite roughly 12 minutes before the start time of the meeting. We do not want to send a notification email for our malicious meeting, because this will include our gmail address. Thus, we will simply place the ’emergency’ meeting on the victims calendar 12 minutes before the start time, and allow the default ’10 minute reminder’ to notify them that they are about to miss an important meeting.

Phishing with Google Calendar6. Once your finished filling out your meeting invite, select the save button. A pop up will appear asking if you would like to send a ‘invitation email’. Make sure to select ‘Dont Send’ because your malicious email address will appear in the email sent to your target.

Phishing with Google Calendar 

Victim’s Perspective
Phishing with Google Calendar
Red Flag

Note that the senders email is obfuscated because we deselected the ‘see guest list’ option. The only red flag is the malicious email address used to send the meeting invite. This address is also obfuscated by the long list of fake phone numbers included in the description. The only way the target will see the sending email is if they scroll all the way down to the bottom of the description.

Phishing with Google Calendar 

Extra Credit

For extra legitimacy, you might want to purchase a domain that is similar to your target company’s URL. You can then set up a Google WorkSpace and Evilginx2 using this similar domain to create an even more legitimate looking attack.

 

原文始发于DrewSec:Phishing with Google Calendar

版权声明:admin 发表于 2022年11月14日 下午1:25。
转载请注明:Phishing with Google Calendar | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...