Skip to main content
Phishing

The Google Workspace Crypto Scam: Social Engineering News 

Researchers recently discovered a scam using Google Workspace comments to bait its targets. In just two weeks attackers were able to trap almost 1,000 businesses. In other words, seventy businesses were targeted each day. Using a tactic known as business email compromise (BEC), the attackers use legitimate Google services within Google Workspace documents to redirect targets to a fake cryptocurrency site.

The attack begins with bad actors creating a free Google account. Using their Google account, the attackers then create a Google sheet and mention their intended target in a comment. The target receives an email notification, as shown in the example below. If the target clicks the link, they are re-directed to a fake cryptocurrency page. There are several types of fake cryptocurrency pages the scammers use; from typical phishing sites that steal credentials to cryptocurrency mining.

The Google Workspace Crypto Scam

Image: Avann

The rising surge in BEC fraud and crypto scams

The Google workspace crypto scam is just one example of the rising surge in BEC fraud and crypto scams. Consider the following statistics:

  • Between April 2022 and April 2023, Microsoft Threat Intelligence detected and investigated 35 million BEC attempts with an adjusted average of 156,000 attempts daily.
  • The FBI’s 2022 Internet Crime Report states that losses from cryptocurrency investment fraud rose from $907 million in 2021 to $2.57 billion in 2022.

Don’t let your company be the next victim. Ongoing employee testing and education is essential if you are to protect your organization from these scams.

Test. Educate. Protect – Social Engineer’s Managed Phishing Service

The use of malicious social engineering is at the core of the Google workspace scam. It’s an example of how threats to information security focus their attacks on company employees.

As the experts in social engineering, we designed our security awareness managed services to test, educate, and protect your human network from Vishing Phishing, SMiShing and Impersonation attacks. Our Managed Phishing Service ethically tests your employees using real-world scenarios. We identify at-risk user groups as employees demonstrate their ability to recognize and report fraudulent emails. Don’t wait until it’s too late; contact us today for a quote.

Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.