Skip to content

Phishing | meet-gooogle.com #1636

@DrMavrodi

Description

@DrMavrodi

What are the subjects of the phishing (domains, URLs or IPs)?

  • meet-gooogle.com

What are the impersonated domains?

  • meet.google.com

Where or how did you discover this phishing?

I discovered this phishing as part of an internal incident investigation after one of our employees reported a suspicious meeting invite received via Telegram. The message contained a link which appeared to be Google Meet but led to the phishing domain meet-gooogle.com; the attacker later edited the Telegram message and replaced the link with the real meet.google.com (the message shows an “edited” label).

During our investigation we found that credentials submitted to the fake page were used to initiate an OAuth link to a third-party service (Bybit); this activity was visible in our Google Workspace audit logs, which show login/OAuth events from suspicious IPs (recorded in our logs) and timestamps. We captured the page source (showing socket.emit('passwordSubmitted', ...)), WHOIS (recent registration), screenshots of the phishing landing, and a VirusTotal record confirming detections.

Do you have a screenshot?

Screenshot

Screenshot of phishing

Related external source

Additional Information or Context

We reported the domain to the registrar/host (Dynadot / Cloudflare) and to security vendors (Kaspersky, Dr.Web, Sophos, OpenPhish, URLhaus, Google Safe Browsing, etc.) and are collecting additional evidence (HTML, JS, network logs) for analysts. If you need any specific artifacts or exact timestamps from our audit logs, I can provide them via a secure channel.

Metadata

Metadata

Labels

phishing-reportA Phishing report that has to be verified.

Type

No type

Projects

Status

🆕 New

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions