Categories: Cyber Security News

Cybercriminals Use Firebase Developer Accounts to Distribute Phishing Emails

A new wave of phishing campaigns where attackers are abusing legitimate Google infrastructure to target victims.

Scammers are leveraging free developer accounts on Google Firebase to send fraudulent emails that effectively bypass traditional security filters.

How the Attack Works

Google Firebase is a widely used platform for building mobile and web applications. It offers a “free tier” that allows developers to test code and host small projects without cost.

Phishing page (source: twitter)

Cybercriminals are now registering these free accounts to host phishing content and send emails, as reported by PaloAlto Network.

Because the emails originate from subdomains ending in firebaseapp.com a domain associated with Google’s reputable infrastructure they possess a high domain reputation.

This allows the malicious emails to slip past spam blocklists and land directly in the victim’s primary inbox.

Phishing page (source: twitter)

The campaign relies on two primary psychological triggers to manipulate victims: fear and greed.

  1. Scare Tactics: Many of the identified emails impersonate popular brands or financial institutions. They send urgent alerts regarding “fraudulent account use,” pressuring the victim to click a link immediately to resolve a non-existent security issue.
  2. High-Value Lures: Conversely, other emails entice users with promises of free, high-value items or exclusive giveaways. These are designed to steal sensitive data, such as credit card numbers or login credentials, under the guise of shipping a prize.

Indicators of Compromise (IOCs)

The investigation highlighted specific patterns in the sender addresses.

These addresses often use random alphanumeric strings attached to the Firebase domain. Observed sender examples include:

  • noreply@pr01-1f199.firebaseapp[.]com
  • noreply@pro04-4a08a.firebaseapp[.]com
  • noreply@zamkksdjauys.firebaseapp[.]com

Once a user clicks the call-to-action button in the email, they are redirected through various URL shorteners or compromised sites to the final phishing page. Malicious redirect chains have been observed using URLs such as:

  • hxxps[:]//rebrand[.]ly/auj0ngh
  • hxxp[:]//clouud.thebatata[.]org/click[.]php?
  • hxxps[:]//www.servercrowdmanage[.]com/5N98X9F/21NRJNSZ/

This campaign demonstrates how attackers are “living off the land” by using trusted services to hide malicious activity.

Security teams are advised to closely monitor traffic from firebaseapp.com subdomains that do not align with known business applications.

Users should remain vigilant against unsolicited emails demanding urgent action, even if the technical sender address appears to be hosted on a legitimate platform.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Cybercriminals Use Firebase Developer Accounts to Distribute Phishing Emails appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

All of the Sarah J. Maas Romantasy Books Are on Sale at Amazon Ahead of Mother’s Day

I first got into reading romantasy books after a friend of mine recommended Fourth Wing…

31 minutes ago

IO Interactive “Can’t Wait” to Return to Hitman Series

IO Interactive has assured fans that there will be more Hitman adventures, and the team…

2 hours ago

Diablo 4’s Secret Cow Level Has Finally Been Discovered, But Some Players Are Disappointed

Diablo 4 fans have finally discovered the game's secret cow level, though some fans are…

2 hours ago

Federal Judge Sides With Church

INDIANAPOLIS, Ind. (WOWO) — A federal judge has cleared the way for a religious freedom…

2 hours ago

1,500 Pounds Of Food Donated

INDIANAPOLIS, Ind. (WOWO) — The generosity of FOX59/CBS4 viewers will help provide thousands of meals…

2 hours ago

A heavenly conversation with Tennessee Republican statesmen

American politician and diplomat Howard Baker (1925-2014), United States Senator from Tennessee, during the Select…

2 hours ago

This website uses cookies.