Phishers Exploit Google Apps Script to Bypass Security Filters and Steal Credentials

Google’s trusted scripting platform is the latest weapon in phishing arsenals, helping attackers craft convincing credential-stealing campaigns that evade traditional email filters.
Cybercriminals are leveraging Google Apps Script, a legitimate tool in Google’s Workspace suite, to host phishing pages that appear trustworthy to both users and security systems. According to research by Cofense, attackers are disguising these pages as authentic login portals to trick users into submitting their credentials — all while operating under the umbrella of a trusted Google domain.
- Phishing emails often masquerade as invoices or tax-related requests, leading victims to click on a malicious link hosted via Google Apps Script.
- Google Apps Script runs under the domain script.google.com, which is whitelisted by many organizations, allowing phishing emails to bypass detection.
- Once on the fake login page, victims are prompted to enter credentials, which are silently sent to the attacker’s server in the background.
- After the data is harvested, the user is redirected to the real service’s login page to avoid suspicion and delay discovery.
- The attacker can remotely update the phishing content without resending links, making this technique more persistent and harder to block.
- This method exploits the inherent trust in cloud service domains and the wide usage of Google Workspace, which adds legitimacy to the phishing attempt.
This new phishing tactic underscores the danger of platform abuse by cybercriminals who exploit trusted domains to cloak malicious activity. As Google Apps Script becomes the latest tool in their arsenal, it’s critical for organizations to rethink their email and link-filtering strategies.
At Net Protector Cyber Security, we advise:
- Blocking or flagging access to suspicious cloud service URLs like script.google.com
- Training employees to verify the source of emails and double-check invoice links
- Implementing advanced email threat detection systems that go beyond domain trust
In the modern cyber threat landscape, trust is the new attack surface — and no platform is immune.
- Other (42)
- Ransomware (148)
- Events and News (27)
- Features (45)
- Security (472)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (45)
- Malware Alerts (218)
- Cyber Attack (264)
- Data Backup (11)
- Data Breach (101)
- Phishing (158)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (57)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (5)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (12)
- Impersonation phishing (1)
- DDoS (6)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)