IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

BEC scammers are using Google Forms to identify easy victims

That unexpected Google Form may be benign, but it can lead to more aggressive tactics

Google Forms opening screen on a smartphone

Security researchers have observed a new tactic business email compromise (BEC) threat actors are using to identify easy victims for future attacks.

The new campaign, which involved thousands of messages predominantly delivered to retail, telecommunications, healthcare, energy, and manufacturing sectors, uses simple emails and Google Forms. The threat actors intentionally leave the Google Forms untitled, making them appear “broken” or unexpected.

According to Proofpoint researchers, the hackers behind the attack use this technique as reconnaissance to pinpoint targets who are particularly susceptible to emails with a sense of urgency and who are prone to clicking links.

In a blog post, researchers said using Google Forms to compose and send emails allows the, to evade email filters. The subjects are unique names of C-level executives from the target organizations, with no attempt to use display-name spoofing. 

The emails are simple but convey a sense of urgency by demanding the recipient completes a "Quick Task" for the threat actor, who claims to be heading into a meeting or too preoccupied to handle the task themselves. 

The link in the email leads the user to a default, untitled form hosted on Google Forms. Researchers said the goal is to elicit a reply from the victim that the survey is broken or not what they expected.  

“As a secondary goal, the form likely serves as a sensor to simply see if anyone fills out their form, functioning as a reconnaissance technique to weed out users who may be susceptible to clicking a suspicious link found in an email,” researchers added.

While these messages may appear primitive, researchers warned there’s still a threat in responding to the email or completing the benign form because user action may lead to follow-up actions honed for a more receptive audience.

“Given the C suite spoofing, we expect that this is an email reconnaissance campaign to enable target selection for undetermined follow-on threat activity. The tone of urgency in the emails is consistent with previous BEC actors, and therefore, we want to ensure security awareness of these attempts as an indication or warning to customers and the security community,” said researchers.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

The truth about cyber security training
Whitepaper

The truth about cyber security training

25 Apr 2022
The truth about cyber security training
Whitepaper

The truth about cyber security training

25 Apr 2022
The Total Economic Impact™ of Mimecast
Whitepaper

The Total Economic Impact™ of Mimecast

25 Apr 2022
The Total Economic Impact™ of Mimecast
Whitepaper

The Total Economic Impact™ of Mimecast

25 Apr 2022

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022