More and more criminals are using legitimate websites to obfuscate malicious payloads

security
(Image credit: Shutterstock / Sashkin)

Hackers are increasingly using legitimate websites to deliver malicious payloads to unsuspecting victims, researchers have revealed.

A report by cybersecurity experts Egress claims some of the world’s most popular websites are being abused to deliver malware, thus effectivelly bypassing standard link checks performed by antivirus and endpoint security solutions.

The paper, based on data taken from Egress’ integrated cloud email security platform, Egress Defend, says YouTube, Amazon AWS, Google Docs, Firebase Storage, and DocuSign are among the top 10 most frequently used websites for this purpose. Furthermore, there has been a 21% increase in the use of this method in Q1 2023, compared to Q4 2022.

Enhancing defenses

“The evolution of phishing emails continues to pose a major threat to organizations, emphasizing the need to enhance defenses to prevent attacks,” said Jack Chapman, VP of Threat Intelligence, Egress. “Every attack we analyzed had bypassed other forms of anti-phishing detection, including secure email gateways (SEGs).”

YouTube has long been used to deploy malware, with hackers creating videos demonstrating how a certain crack, or key generator, work, and then provide the download link in the description (or in the video itself). The program being demonstrated is actually malware, and people who download it often end up losing either their data, or their money or cryptocurrencies.

Google Docs was also observed being abused to deliver malware. Threat actors would create a Docs file with a malicious link inside, and then use the Share option to deliver the document to the victims. The link to the file is then shared via email, and given that it’s coming through Google’s domain, email security solutions usually allow it through to the inbox.

To protect against such attacks, the report argues, businesses need to adapt their defenses. Behavior-based email security needs to be prioritized, which also means deploying AI to mitigate the increase in threats evading signature-based and reputation-based perimeter security. Furthermore, businesses should deploy natural language processing and natural language understanding to defend themselves from sophisticated attacks, the report concludes. 

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Trojan
Hackers hide malware into website images to go unnoticed
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Illustration of a hooked email hovering over a mobile phone
AWS misconfigurations reportedly used to launch phishing attacks
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
malware
Google warns of legit VPN apps being used to infect devices with malware
Latest in Security
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedly left users exposed for months
DeepSeek
Fake DeepSeek installers are infecting your device with dangerous malware
AI tools.
Not even fairy tales are safe - researchers weaponise bedtime stories to jailbreak AI chatbots and create malware
Data leak
Top California sperm bank suffers embarrassing leak
An Android phone being held in the hand
These malicious Android apps were installed over 60 million times - here's how to stay safe
ransomware avast
Billions of credentials were stolen from businesses around the world in 2024
Latest in News
Canon March 2025 launch teaser
Canon teases two big vlogging camera launches for next week – and one looks to be the PowerShot V1
A collage of Eve Macarro in Ballerina and John Wick in his third film
New Ballerina movie trailer suggests Keanu Reeves' John Wick will have a bigger role to play in the spin-off film than we thought
Stability AI 3D Video
Stability AI’s new virtual camera turns any image into a cool 3D video and I’m blown away by how good it is
The Google Wallet app with a mode for kids shown on-screen.
Google Wallet’s new kid-friendly payment system is a win for parents
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
A worrying Apple Password App vulnerability reportedly left users exposed for months
Vertere DG-X turntable on a pink/white TechRadar background
Vertere's elite DG X turntable is modular, expensive, and hugely desirable