Send Link mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://mailman.anu.edu.au/mailman/listinfo/link
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Link digest..."


Today's Topics:

   1. Google Advanced Protection Program (Stephen Loosley)
   2. Re: Google Advanced Protection Program (Philip N Argy)


----------------------------------------------------------------------

Message: 1
Date: Mon, 14 Oct 2024 22:27:47 +1030
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] Google Advanced Protection Program
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"

New Gmail Security Alert For 2.5 Billion Users As AI Hack Confirmed

By Davey Winder Oct 13, 2024 
https://www.forbes.com/sites/daveywinder/2024/10/13/new-gmail-security-alert-for-billions-as-7-day-ai-hack-confirmed/

(Update, Oct. 13, 2024: This story, originally published Oct. 11, includes 
details of a new Google anti-scam alliance initiative, a new warning about 
legitimate-looking support scams and details of Google?s Advanced Protection 
Program to protect high-risk accounts.)


Google has implemented increasingly sophisticated protections against those who 
would compromise your Gmail account?but hackers using AI-driven attacks are 
also evolving. 

According to Google?s own figures, there are currently more than 2.5 billion 
users of the Gmail service. No wonder, then, that it is such a target for 
hackers and scammers. Here?s what you need to know.

The Latest AI-Driven Gmail Attack Is Scary Good

Sam Mitrovic, a Microsoft solutions consultant, has issued a warning after 
almost falling victim to what is described as a ?super realistic AI scam call? 
capable of tricking even the most experienced of users.

It all started a week before Mitrovic realized the sophistication of the attack 
that was targeting him. 

?I received a notification to approve a Gmail account recovery attempt,? 
Mitrovic recounts in a blog post warning other Gmail users of the threat in 
question. The need to confirm an account recovery, or a password reset, is a 
notorious phishing attack methodology intended to drive the user to a fake 
login portal where they need to enter their credentials to report the request 
as not initiated by them.

Unsurprisingly, then, Mitrovic wasn?t falling for this and ignored the 
notification that appeared to originate from the U.S. and a missed phone call, 
pertaining to be from Google in Sydney, Australia, some 40 minutes later. So 
far, so relatively straightforward and easy to avoid. 

Then, almost exactly a week later, the fun started in earnest?another 
notification request for account recovery approval followed by a telephone call 
40 minutes later. This time, Mitrovic didn?t miss the call and instead picked 
up: an American voice, claiming to be from Google support, confirmed that there 
was suspicious activity on the Gmail account.

?He asks if I?m traveling,? Mitrovic said, ?when I said no, he asks if I logged 
in from Germany, to which I reply no.? All of this to engender trust in the 
caller and fear in the recipient. This is when things turned dark fast and 
really rather clever in the overall scheme of phishing things. 

The so-called Google support person informed Mitrovic that an attacker had 
accessed his Gmail account for the past 7 days, and had already downloaded 
account data. This rang alarm bells as Mitrovic recalled the recovery 
notification and missed call from a week earlier.

Googling the phone number he was being called from while speaking, Mitrovic 
discovered that it did, indeed, lead to Google business pages. 

This alone is a clever tactic likely to fool plenty of unsuspecting users 
caught up in the panic of the moment, as it wasn?t a Google support number but 
rather about getting calls from Google Assistant. ?At the start of the call, 
you'll hear the reason for the call and that the call is from Google. You can 
expect the call to come from an automated system or, in some cases, a manual 
operator,? the 100% genuine page helpfully informs the reader.

Garry Tan, the founder of venture capital firm and startup accelerator Y 
Combinator, has taken to X, formerly known as Twitter, to issue a warning about 
another phishing scam that he described as being ?pretty elaborate? which also 
leverages AI so as to present itself as believable. 

Once again, as with the scam that almost fooled Sam Mitrovic, a security 
consultant remember, this latest warning concerns contact from a so-called 
Google support technician. I wouldn?t go as far as one commenter on X who 
suggested the giveaway was that Google doesn?t have any support for users, but 
it?s not that too far from the truth when it comes to these scams: Google 
support will not contact you out of the blue like this. ?Do not click yes on 
this dialog,? Tan warned, ?you will be phished.?

In the case of the scam that targeted Tan, the supposed Google support person 
claimed that the company had received a death certificate and a family member 
was attempting to recover his account. The caller, in other words, and only AI 
could be this stupid, was checking that the person answering was alive. 

?It's a pretty elaborate ploy to get you to allow password recovery,? Tan went 
on to warn, but spotted that the account recovery screen he was presented with 
had a device field that displayed the name of a Google support worker rather 
than an actual device used to access the account. 

Tan suggested that whoever designed the interface for recovery should be 
employing some pretty basic regular expression checks, or even AI-based fraud 
detection, on the text field in question. ?It's trivial to check the device 
name for this,? he concluded. Part of the scam involved getting Tan to re-add 
his cellphone number as part of the verification process to trigger an account 
recovery dialog. Tan was, however, wise to this: ?I?ve been SIM swapped, so 
know not to have my cell on my accounts ever,? Tan explained.

Using Google Forms To Make Contact Appear Legitimate

Fraudsters have also been seen abusing Google Forms, a free online tool that is 
part of Google Workspace, to create legitimate looking documents sent as part 
of support scams. By sending a copy of the form to the target address, using 
the response receipt option of Google Forms, the document is sent via genuine 
Google servers which adds legitimacy to the scam. Checking the email will show 
it as being from [email protected] for example, which acts to lower 
any red flags the recipient might have had. 

One such scam used such a form to mimic an account recovery password reset 
form, telling the target they would get a SMS notification from a named support 
agent and giving them the number to check. This double-legitimacy method is 
enough to fool plenty of people, lots of the time. In this case, the slip-up, 
and only then if the person on the receiving end was savvy enough to realize, 
was a confusingly complex and overlong password reset process.

Lessons To Be Learned From These Google Support Hack Near Misses

Mitrovic did the right thing, or at least the next best thing to hanging up, 
and asked the supposed support guy to send an email confirmation?an email which 
arrived soon after, from a Google domain and looking for all intents and 
purposes genuine. AT this point he noticed the to field contained a cleverly 
disguised address that wasn?t actually a Google domain but could, once again, 
easily fool those not of a technical bent.

The real giveaway for Mitrovic, however, was when the caller said hello and 
after no response said hello again. ?At this point I released it as an AI voice 
as the pronunciation and spacing were too perfect,? Mitrovic said.

It?s well worth reading the original blog from Mitrovic as it contains much 
more technical detail and detective work that I don?t have the space to cover 
in this report. 

Knowledge is everything, and the threat intelligence provided by this 
consultant is genuinely invaluable for anyone who might find themselves in a 
similar situation: forearmed is forewarned.

It?s almost a certainty that the attacker would have continued to a point where 
the so-called recovery process would be initiated, in truth this would be a 
cloned login portal capturing user credentials and likely the use of some kind 
of session cookie stealing malware to bypass two-factor authentication if that 
was in place.

Google Launches The Global Signal Exchange To Fight Scammers

Google has announced that it has joined forces with the Global Anti-Scam 
Alliance and the DNS Research Federation to form a new initiative in the battle 
against scammers. The Global Signal Exchange will act as an 
intelligence-sharing platform when it comes to scams and fraud, providing 
real-time insight into the cybercrime supply chain. As the first founding 
member of the Global Signal Exchange, Google hopes that the platform will 
become, in effect, a global clearinghouse for the kind of intelligence signals 
that are connected to bad actors and their attacks.

Amanda Storey, senior director of trust and safety at Google said that the 
collaboration ?leverages the strengths of each partner.? With GASA having an 
extensive existing network of interested stakeholders and the DNS Research 
Foundation a data platform with more than 40 million existing signals, ?GSE 
aims to improve the exchange of abuse signals, enabling faster identification 
and disruption of fraudulent activities across various sectors, platforms and 
services.?

The ultimate goal, Google confirmed, is to create a solution that not only 
operates at the almost unthinkable scale of the internet itself but does so in 
an efficient and, above all, user-friendly way. This means that qualifying 
organizations will be able to use it to hit back at scammers. 

Google already has plenty of experience in this field, with a long-established 
history of entering into partnerships to help fight fraud. Indeed, as part of 
the testing of the new Global Signal Exchange, Google shared more than 100,000 
malicious URLs and consumed a staggering million scam signals for analysis. 
?We'll start by sharing Google Shopping URLs that we have actioned under our 
scams policies,? Nafis Zebarjadi, Google?s account security product manager 
said, ?and as we gain experience from the pilot, we will look to add data soon 
from other relevant Google product areas.?

The Global Signal Exchange, or at least the engine that drives it, runs on the 
Google Cloud to enable all participants to share and consume intelligence 
signals while ?benefiting from Google Cloud Platform's Al capabilities to find 
patterns and match signals smartly,? Storey concluded.

Staying Safe From The Most Advanced Of Gmail Scams

AI deepfakes are not just used for porn and politics, they are used to 
perpetrate seemingly straightforward account takeovers such as in this case. 
Stay calm if you are approached by someone claiming to be from Google support, 
they won?t phone you so there?s a massive red flag right away, and no harm will 
come to you if you hang up. 

Use the tools at your disposal, ironically Google search itself and your Gmail 
account, to make checks during the call if you are concerned its could be 
genuine and ignoring it could cause harm. Search for the phone number, see 
where it?s really coming from. Check your Gmail activity to see what, if any, 
devices other than your own have been using the account. Take note of what 
Google says about staying safe from attackers using Gmail phishing scams. Most 
importantly, never let yourself be rushed into making a knee-jerk reaction, no 
matter how much urgency is injected into a conversation. 

It?s that sense of urgency that the attackers rely upon to swerve your normal 
good judgement and click a link or give up credentials.

I would also advise considering enrolment into Google?s Advanced Protection 
Program, designed for users such as journalists, activists and politicians who 
may be thought of as high-risk account holders. 

One of the downsides of the Advanced Protection Program had always been that it 
required the purchase of not one, but two hardware security keys to use when 
signing into the account. The financial burden was lifted recently earlier in 
the year when Google announced that passkey support was coming to Advanced 
Protection Program users.

The combination of the protections brought by both of these technologies makes 
it something of a no-brainer for most people with a Google account, including 
all Gmail users. 

Here?s why. Signing into Google on any device requires the passkey when first 
used, which means that even if a hacker had got your username and account, 
without the device that passkey is stored on (your smartphone) and your 
biometrics needed to verify it, they could not sign in. 

Using this in conjunction with Advanced Protection Program enrolment, which 
restricts most non-Google apps and services from accessing your Gmail account 
data, also makes phished password and account recovery much harder to pull off. 

?If anyone tries to recover your account,? a Google spokesperson said, 
?Advanced Protection takes extra steps to verify your identity.? 

This means that it can take a few days to verify that you are who you say and 
get access to your Google account back. But it means that hackers can?t just 
scam their way into it either.

--



------------------------------

Message: 2
Date: Mon, 14 Oct 2024 14:45:25 +0000
From: Philip N Argy <[email protected]>
To: "[email protected]" <[email protected]>
Subject: Re: [LINK] Google Advanced Protection Program
Message-ID:
        
<sy4p282mb36150033cea9982663911b16d1...@sy4p282mb3615.ausp282.prod.outlook.com>
        
Content-Type: text/plain; charset="utf-8"

The sooner we get a reliable government-supported global public key lookup 
table (as ubiquitous as the DNS itself) the sooner everyone will be able to use 
signed emails by default.  It won't prevent scammers from getting a digital 
credential but it will reduce some of the easy scams like sender email spoofing.
Philip Argy

-----Original Message-----
From: Link <[email protected]> On Behalf Of Stephen Loosley
Sent: Monday, 14 October 2024 22:58
To: link <[email protected]>
Subject: [LINK] Google Advanced Protection Program

New Gmail Security Alert For 2.5 Billion Users As AI Hack Confirmed

By Davey Winder Oct 13, 2024 
https://www.forbes.com/sites/daveywinder/2024/10/13/new-gmail-security-alert-for-billions-as-7-day-ai-hack-confirmed/

(Update, Oct. 13, 2024: This story, originally published Oct. 11, includes 
details of a new Google anti-scam alliance initiative, a new warning about 
legitimate-looking support scams and details of Google?s Advanced Protection 
Program to protect high-risk accounts.)


Google has implemented increasingly sophisticated protections against those who 
would compromise your Gmail account?but hackers using AI-driven attacks are 
also evolving. 

According to Google?s own figures, there are currently more than 2.5 billion 
users of the Gmail service. No wonder, then, that it is such a target for 
hackers and scammers. Here?s what you need to know.

The Latest AI-Driven Gmail Attack Is Scary Good

Sam Mitrovic, a Microsoft solutions consultant, has issued a warning after 
almost falling victim to what is described as a ?super realistic AI scam call? 
capable of tricking even the most experienced of users.

It all started a week before Mitrovic realized the sophistication of the attack 
that was targeting him. 

?I received a notification to approve a Gmail account recovery attempt,? 
Mitrovic recounts in a blog post warning other Gmail users of the threat in 
question. The need to confirm an account recovery, or a password reset, is a 
notorious phishing attack methodology intended to drive the user to a fake 
login portal where they need to enter their credentials to report the request 
as not initiated by them.

Unsurprisingly, then, Mitrovic wasn?t falling for this and ignored the 
notification that appeared to originate from the U.S. and a missed phone call, 
pertaining to be from Google in Sydney, Australia, some 40 minutes later. So 
far, so relatively straightforward and easy to avoid. 

Then, almost exactly a week later, the fun started in earnest?another 
notification request for account recovery approval followed by a telephone call 
40 minutes later. This time, Mitrovic didn?t miss the call and instead picked 
up: an American voice, claiming to be from Google support, confirmed that there 
was suspicious activity on the Gmail account.

?He asks if I?m traveling,? Mitrovic said, ?when I said no, he asks if I logged 
in from Germany, to which I reply no.? All of this to engender trust in the 
caller and fear in the recipient. This is when things turned dark fast and 
really rather clever in the overall scheme of phishing things. 

The so-called Google support person informed Mitrovic that an attacker had 
accessed his Gmail account for the past 7 days, and had already downloaded 
account data. This rang alarm bells as Mitrovic recalled the recovery 
notification and missed call from a week earlier.

Googling the phone number he was being called from while speaking, Mitrovic 
discovered that it did, indeed, lead to Google business pages. 

This alone is a clever tactic likely to fool plenty of unsuspecting users 
caught up in the panic of the moment, as it wasn?t a Google support number but 
rather about getting calls from Google Assistant. ?At the start of the call, 
you'll hear the reason for the call and that the call is from Google. You can 
expect the call to come from an automated system or, in some cases, a manual 
operator,? the 100% genuine page helpfully informs the reader.

Garry Tan, the founder of venture capital firm and startup accelerator Y 
Combinator, has taken to X, formerly known as Twitter, to issue a warning about 
another phishing scam that he described as being ?pretty elaborate? which also 
leverages AI so as to present itself as believable. 

Once again, as with the scam that almost fooled Sam Mitrovic, a security 
consultant remember, this latest warning concerns contact from a so-called 
Google support technician. I wouldn?t go as far as one commenter on X who 
suggested the giveaway was that Google doesn?t have any support for users, but 
it?s not that too far from the truth when it comes to these scams: Google 
support will not contact you out of the blue like this. ?Do not click yes on 
this dialog,? Tan warned, ?you will be phished.?

In the case of the scam that targeted Tan, the supposed Google support person 
claimed that the company had received a death certificate and a family member 
was attempting to recover his account. The caller, in other words, and only AI 
could be this stupid, was checking that the person answering was alive. 

?It's a pretty elaborate ploy to get you to allow password recovery,? Tan went 
on to warn, but spotted that the account recovery screen he was presented with 
had a device field that displayed the name of a Google support worker rather 
than an actual device used to access the account. 

Tan suggested that whoever designed the interface for recovery should be 
employing some pretty basic regular expression checks, or even AI-based fraud 
detection, on the text field in question. ?It's trivial to check the device 
name for this,? he concluded. Part of the scam involved getting Tan to re-add 
his cellphone number as part of the verification process to trigger an account 
recovery dialog. Tan was, however, wise to this: ?I?ve been SIM swapped, so 
know not to have my cell on my accounts ever,? Tan explained.

Using Google Forms To Make Contact Appear Legitimate

Fraudsters have also been seen abusing Google Forms, a free online tool that is 
part of Google Workspace, to create legitimate looking documents sent as part 
of support scams. By sending a copy of the form to the target address, using 
the response receipt option of Google Forms, the document is sent via genuine 
Google servers which adds legitimacy to the scam. Checking the email will show 
it as being from [email protected] for example, which acts to lower 
any red flags the recipient might have had. 

One such scam used such a form to mimic an account recovery password reset 
form, telling the target they would get a SMS notification from a named support 
agent and giving them the number to check. This double-legitimacy method is 
enough to fool plenty of people, lots of the time. In this case, the slip-up, 
and only then if the person on the receiving end was savvy enough to realize, 
was a confusingly complex and overlong password reset process.

Lessons To Be Learned From These Google Support Hack Near Misses

Mitrovic did the right thing, or at least the next best thing to hanging up, 
and asked the supposed support guy to send an email confirmation?an email which 
arrived soon after, from a Google domain and looking for all intents and 
purposes genuine. AT this point he noticed the to field contained a cleverly 
disguised address that wasn?t actually a Google domain but could, once again, 
easily fool those not of a technical bent.

The real giveaway for Mitrovic, however, was when the caller said hello and 
after no response said hello again. ?At this point I released it as an AI voice 
as the pronunciation and spacing were too perfect,? Mitrovic said.

It?s well worth reading the original blog from Mitrovic as it contains much 
more technical detail and detective work that I don?t have the space to cover 
in this report. 

Knowledge is everything, and the threat intelligence provided by this 
consultant is genuinely invaluable for anyone who might find themselves in a 
similar situation: forearmed is forewarned.

It?s almost a certainty that the attacker would have continued to a point where 
the so-called recovery process would be initiated, in truth this would be a 
cloned login portal capturing user credentials and likely the use of some kind 
of session cookie stealing malware to bypass two-factor authentication if that 
was in place.

Google Launches The Global Signal Exchange To Fight Scammers

Google has announced that it has joined forces with the Global Anti-Scam 
Alliance and the DNS Research Federation to form a new initiative in the battle 
against scammers. The Global Signal Exchange will act as an 
intelligence-sharing platform when it comes to scams and fraud, providing 
real-time insight into the cybercrime supply chain. As the first founding 
member of the Global Signal Exchange, Google hopes that the platform will 
become, in effect, a global clearinghouse for the kind of intelligence signals 
that are connected to bad actors and their attacks.

Amanda Storey, senior director of trust and safety at Google said that the 
collaboration ?leverages the strengths of each partner.? With GASA having an 
extensive existing network of interested stakeholders and the DNS Research 
Foundation a data platform with more than 40 million existing signals, ?GSE 
aims to improve the exchange of abuse signals, enabling faster identification 
and disruption of fraudulent activities across various sectors, platforms and 
services.?

The ultimate goal, Google confirmed, is to create a solution that not only 
operates at the almost unthinkable scale of the internet itself but does so in 
an efficient and, above all, user-friendly way. This means that qualifying 
organizations will be able to use it to hit back at scammers. 

Google already has plenty of experience in this field, with a long-established 
history of entering into partnerships to help fight fraud. Indeed, as part of 
the testing of the new Global Signal Exchange, Google shared more than 100,000 
malicious URLs and consumed a staggering million scam signals for analysis. 
?We'll start by sharing Google Shopping URLs that we have actioned under our 
scams policies,? Nafis Zebarjadi, Google?s account security product manager 
said, ?and as we gain experience from the pilot, we will look to add data soon 
from other relevant Google product areas.?

The Global Signal Exchange, or at least the engine that drives it, runs on the 
Google Cloud to enable all participants to share and consume intelligence 
signals while ?benefiting from Google Cloud Platform's Al capabilities to find 
patterns and match signals smartly,? Storey concluded.

Staying Safe From The Most Advanced Of Gmail Scams

AI deepfakes are not just used for porn and politics, they are used to 
perpetrate seemingly straightforward account takeovers such as in this case. 
Stay calm if you are approached by someone claiming to be from Google support, 
they won?t phone you so there?s a massive red flag right away, and no harm will 
come to you if you hang up. 

Use the tools at your disposal, ironically Google search itself and your Gmail 
account, to make checks during the call if you are concerned its could be 
genuine and ignoring it could cause harm. Search for the phone number, see 
where it?s really coming from. Check your Gmail activity to see what, if any, 
devices other than your own have been using the account. Take note of what 
Google says about staying safe from attackers using Gmail phishing scams. Most 
importantly, never let yourself be rushed into making a knee-jerk reaction, no 
matter how much urgency is injected into a conversation. 

It?s that sense of urgency that the attackers rely upon to swerve your normal 
good judgement and click a link or give up credentials.

I would also advise considering enrolment into Google?s Advanced Protection 
Program, designed for users such as journalists, activists and politicians who 
may be thought of as high-risk account holders. 

One of the downsides of the Advanced Protection Program had always been that it 
required the purchase of not one, but two hardware security keys to use when 
signing into the account. The financial burden was lifted recently earlier in 
the year when Google announced that passkey support was coming to Advanced 
Protection Program users.

The combination of the protections brought by both of these technologies makes 
it something of a no-brainer for most people with a Google account, including 
all Gmail users. 

Here?s why. Signing into Google on any device requires the passkey when first 
used, which means that even if a hacker had got your username and account, 
without the device that passkey is stored on (your smartphone) and your 
biometrics needed to verify it, they could not sign in. 

Using this in conjunction with Advanced Protection Program enrolment, which 
restricts most non-Google apps and services from accessing your Gmail account 
data, also makes phished password and account recovery much harder to pull off. 

?If anyone tries to recover your account,? a Google spokesperson said, 
?Advanced Protection takes extra steps to verify your identity.? 

This means that it can take a few days to verify that you are who you say and 
get access to your Google account back. But it means that hackers can?t just 
scam their way into it either.

--

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link



------------------------------

Subject: Digest Footer

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link


------------------------------

End of Link Digest, Vol 383, Issue 20
*************************************

Reply via email to