Phishing Lures Utilizing a Single Google Cloud Storage Bucket
3 March 2026 at 18:44
I have documented a campaign consisting of more 25 distinct phishing variants that all converge on a single Google Cloud Storage (GCS) infrastructure point.
Core Infrastructure:
- Primary Host: storage/.googleapis/.com
- Bucket/Object: /whilewait/comessuccess.html
Analysis Highlights:
Evasion Strategy: The campaign utilizes the inherent trust of the googleapis/.com domain to bypass SPF/DKIM-based reputation filters and secure email gateways (SEGs).
Lure Variance: Social engineering hooks include Scareware (Storage Full/Threat Detected), Retail Rewards (Lowe's/T-Mobile), and Lifestyle/Medical lures.
Redirect Logic: The comessuccess.html file serves as a centralized gatekeeper, redirecting traffic to secondary domains designed for Credit Card (CC) harvesting via fraudulent subscriptions.
[link] [comments]