On Thu, 10 Nov 2022, MRob via mailop wrote:

Recent I saw a link in a spam which wanted to phish credential:

https://translate.google.com/translate?sl=auto&tl=en&hl=en&u=ipfs.io/ipfs/<longstring>/index.html?submit=<user>@<mydomain>&client=webapp

Google translate shows a live page the user can input data into so effectively google is hosting the payload for the spammer? (indirect over anon IPFS network)

See for yourself:

https://translate.google.com/translate?sl=auto&tl=en&hl=en&u=duckduckgo.com

https://translate.google.com/translate?sl=auto&tl=en&hl=en&u=spammers.dontlike.us/mailman/listinfo/

Now you can click on the "List" link, see that it allows to browse the mailman website using google domain translate.goog

First, I missed that Google was given a TLD (whois says back in 2015)

So spammer and phisher can host website on sketchy server but freely use Google for best possible reputation for web hosting and for putting link into spam email and successfully avoid URIBL type checks.

Thanks for the heads-up.

(Some) browsers can do automatic translation; we can encourage users to
post the original URL and "down-repute" translate.google.com and .goog

Is it worth an article in redit or similar ?

Does anyone have access to proofpoint urldefence.com and similar
to see what they do ?

--
Andrew C. Aitchison                      Kendal, UK
                   [email protected]
_______________________________________________
mailop mailing list
[email protected]
https://list.mailop.org/listinfo/mailop

Reply via email to