Recent I saw a link in a spam which wanted to phish credential:

https://translate.google.com/translate?sl=auto&tl=en&hl=en&u=ipfs.io/ipfs/<longstring>/index.html?submit=<user>@<mydomain>&client=webapp

Google translate shows a live page the user can input data into so effectively google is hosting the payload for the spammer? (indirect over anon IPFS network)

See for yourself:

https://translate.google.com/translate?sl=auto&tl=en&hl=en&u=duckduckgo.com

https://translate.google.com/translate?sl=auto&tl=en&hl=en&u=spammers.dontlike.us/mailman/listinfo/

Now you can click on the "List" link, see that it allows to browse the mailman website using google domain translate.goog

So spammer and phisher can host website on sketchy server but freely use Google for best possible reputation for web hosting and for putting link into spam email and successfully avoid URIBL type checks.
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to