Fake Google Forms Phishing Steals Google Account Credentials


Threat actors launched a phishing campaign targeting job seekers with fake Google Forms sites at forms.google.ss-o[.]com. The fraudulent domain mimics legitimate forms.google.com while suggesting “single sign-on” functionality. Victims reveal Google login credentials through convincing job application lures.

Attackers distribute links via targeted emails and LinkedIn messages. Pages advertise Customer Support Executive positions requiring name, email, and qualifications. Design replicates official Google Forms with logos, colors, and disclaimers.

Malwarebytes identified the infrastructure during job scam research. The fake site redirects suspicious traffic to local Google search to evade analysis. 

Personalized phishing URLs generate via generation_form.php script. Each victim receives unique tracking links. Clicking “Sign in” redirects to id-v4[.]com/generation.php, a credential harvester active for nearly a year.

Phishing Infrastructure

Primary domains:

  • forms.google.ss-o[.]com (active phishing)
  • id-v4[.]com/generation.php (credential capture)

Redirect logic:

  • Legitimate browsers → Google login phishing
  • Security scanners → Local Google search
  • Known bad User-Agents → Benign pages

Job lure specifics:

  • Customer Support Executive position
  • “Why do you deserve this role?” open text
  • Professional Google Forms styling

Google accounts enable access to Gmail, Drive, YouTube, and connected services. Stolen credentials fuel business email compromise and account takeover chains.

Attack Flow Diagram

StageActionVictim Experience
1Phishing email/LinkedInJob application link
2forms.google.ss-o[.]comConvincing Google Forms
3Form submission“Sign in with Google” prompt
4id-v4[.]com/generation.phpReal Google login page overlay
5Credentials capturedRedirect to legitimate search

Credential harvest success → Attacker gains Gmail/Drive/YouTube access.

Technical Evasion Features

Domain impersonation:

textforms.google.com      ← Legitimate
forms.google.ss-o.com ← Phishing (SS-O = Single Sign-On)

Anti-analysis:

textUser-Agent: Security scanner → 127.0.0.1 Google redirect
User-Agent: Normal browser → Phishing page

Dynamic tracking:

textgeneration_form.php → Unique victim URLs
Session persistence across redirects

Victim Targeting Profile

Primary targets:

  • Job seekers (recent graduates, career switchers)
  • LinkedIn active professionals
  • Entry-level IT/support roles

Distribution channels:

  • Unsolicited job offer emails
  • LinkedIn InMail messages
  • Professional networking spam

Geographic focus: Global English speakers, tech industry concentration.

Protection Measures

Immediate user actions:

  • Verify Google Forms URLs end in forms.google.com
  • Never enter credentials on job application forms
  • Use password manager autofill detection
  • Enable Google 2FA immediately

Enterprise controls:

textBlock *.ss-o.com domains
Email filter: "Google Forms" + external links
DLP: Google credentials on non-corporate domains
Train employees: Job offers via official channels only

Browser protections:

textuBlock Origin: forms.google.ss-o.com
HTTPS Everywhere: Reject invalid certs
Password manager warnings

Indicators of Compromise

TypeValueStatus
Phishing Domainforms.google.ss-o[.]comActive
Credential Harvesterid-v4[.]com/generation.phpTaken down
Lure Content“Customer Support Executive”Active campaign
Traffic RedirectLocal Google searchAnti-analysis

Google Account Defense Layers

Post-compromise:

texthttps://myaccount.google.com/security-checkup
Review recent activity
Sign out all sessions
Change password + enable 2FA

Advanced:

textGoogle Workspace admins → Suspicious login alerts
Gmail security notifications
OAuth app permissions review

Campaign Attribution Notes

Infrastructure reuse:

  • id-v4[.]com/generation.php → Multiple phishing ops
  • Professional phishing-as-a-service kit
  • Job seeker targeting consistent with prior campaigns

Tactics evolution:

text2025: Basic Google Forms abuse
2026: Sophisticated domain + redirect logic

FAQ

What domain steals Google credentials?

forms.google.ss-o[.]com impersonates forms.google.com. 

How does fake Google Forms work?

Job application lures → credential phishing → id-v4[.]com capture.

What job position advertised?

Customer Support Executive requiring Google login.

Anti-analysis techniques used?

Redirects security scanners to local Google search.

Immediate user protection?

Password managers block autofill, enable Google 2FA.

Enterprise email filters needed?

Block forms.google.ss-o[.]com + “Google Forms” external links.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages