HACKER GROUPS called PINEAPPLE and FLUXROOT Exploit Google Cloud to Conduct Credential Phishing

Jul 22, 2024NewsroomCloud Security / Phishing Attack

FLUXROOT, a financially driven group originating from Latin America (LATAM), has been seen utilizing Google Cloud’s serverless projects for orchestrating credential phishing operations, u

PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing

Jul 22, 2024NewsroomCloud Security / Phishing Attack

PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing

FLUXROOT, a financially driven group originating from Latin America (LATAM), has been seen utilizing Google Cloud’s serverless projects for orchestrating credential phishing operations, underscoring the exploitation of cloud computing infrastructure for malign intent.

“Developers and corporations find serverless architectures appealing due to their adaptability, cost efficiency, and user-friendliness,” mentioned Google in its semiannual Threat Horizons Report [PDF] shared with The Hacker News.

“These traits also make serverless computing services provided by various cloud providers enticing to malevolent entities who utilize them for disseminating malware, hosting illicit phishing sites, and executing harmful scripts tailored to function in a serverless ecosystem.”

Cybersecurity

The scheme entailed the deployment of Google Cloud container links to host deceptive pages aimed at extracting login details linked with Mercado Pago, a preferred online payment service in the LATAM area.

Google stated that FLUXROOT is recognized for disseminating the Grandoreiro banking trojan and recent initiatives have included exploiting legitimate cloud services such as Microsoft Azure and Dropbox for delivering the malware.

In a separate incident, adversaries using the moniker PINEAPPLE leveraged Google’s cloud infrastructure to proliferate a data-stealing malware referred to as Astaroth (also known as Guildma) in assaults targeting users from Brazil.

“PINEAPPLE leveraged compromised Google Cloud instances and self-created Google Cloud projects to produce container links on legitimate Google Cloud serverless domains like cloudfunctions[.]net and run.app,” Google pointed out. “The links directed individuals to malicious infrastructure hosting Astaroth.”

Moreover, the cybercriminals attempted to sidestep email security measures by exploiting mail forwarding services that do not discard messages lacking Sender Policy Framework (SPF) records or inserting unexpected data in the SMTP Return-Path field to induce a DNS request timeout, leading to email authentication failures.

The tech giant revealed that it intervened by shutting down the malicious Google Cloud projects and updating its Safe Browsing lists.

The misuse of cloud services and architecture by malefactors – spanning from unauthorized cryptocurrency mining as a result of inadequate setups to ransomware – has been fueled by the wider embrace of cloud technology across various sectors.

Furthermore, this approach aids cyber adversaries in blending seamlessly into routine network operations, thereby making their detection significantly more challenging.

“Cybercriminals exploit the versatility and deployment simplicity of serverless platforms to spread malware and host deceptive websites,” as per the company. “Adversaries misusing cloud services adapt their strategies in response to defensive actions employed by security teams.”

Enjoyed this piece? Stay connected with us on Twitter and LinkedIn for more exclusive content updates.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.