It's an interesting attack angle. Has anyone here seen any user fall for anything similar? I want to say no one would fall for that but experience tells me I should never underestimate what an end user will fall prey to.

On 2022-11-10 13:22, MRob via mailop wrote:
Recent I saw a link in a spam which wanted to phish credential:

https://translate.google.com/translate?sl=auto&tl=en&hl=en&u=ipfs.io/ipfs/<longstring>/index.html?submit=<user>@<mydomain>&client=webapp

Google translate shows a live page the user can input data into so effectively google is hosting the payload for the spammer? (indirect over anon IPFS network)

See for yourself:

https://translate.google.com/translate?sl=auto&tl=en&hl=en&u=duckduckgo.com

https://translate.google.com/translate?sl=auto&tl=en&hl=en&u=spammers.dontlike.us/mailman/listinfo/

Now you can click on the "List" link, see that it allows to browse the mailman website using google domain translate.goog

So spammer and phisher can host website on sketchy server but freely use Google for best possible reputation for web hosting and for putting link into spam email and successfully avoid URIBL type checks.
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to