Summary

  • AMP is an open-source HTML framework that makes web content load faster on mobile devices.
  • Researchers have found a new phishing tactic that uses Google AMP to make URLs look trustworthy.
  • The tactic involves using the URL of a web page cached by the Google AMP Viewer. This URL looks similar to the original URL, but it is actually served from the google.com domain.
  • This gives the malicious website the legitimacy of the google.com domain, which can trick users into entering their personal information.
  • The researchers found that the Google AMP URLs have proven to be very successful at reaching users, even in environments protected by secure email gateways.
  • Along with using Google AMP URLs, the researchers also saw other techniques being used in phishing attacks, such as open redirects on trusted domains, chains of redirects linking the AMP URL to the malicious site, image-based phishing emails, and CAPTCHA services to disrupt automated analysis.
  • To avoid phishing attacks, it is important to not take things at face value for messages requiring urgent attention. It is also important to use a phishing-resistant password manager and a FIDO2 2FA device.
  • Maajmaaj@lemmy.ca
    link
    fedilink
    English
    arrow-up
    10
    arrow-down
    1
    ·
    1 year ago

    Conspiracy theory I just created with no research whatsoever: Google came up with this exploit themselves as a false flag to gain support for WEI.

    • MaggiWuerze@feddit.de
      link
      fedilink
      English
      arrow-up
      12
      ·
      1 year ago

      Ooorrrrr… AMP is just a shit piece of technology that’s sole purpose is to shovel all your information into Googles gaping maw by obfuscating urls behind an AMP link and these phishers just took it to it’s logical conclusion.

      I the end Google needs to be broken up and Chrome AND Chromium each need to be their own thing like Firefox is