spot_img

Date:

Share:

Form-idable foe: Crypto scammers target users through Google Forms

Monday, 28 July 2025; Kaspersky researchers have discovered a new wave of scam attacks that use Google Forms to target crypto users. Knowing the email address of the potential victim, the attackers send a scam email through Google Forms, which is designed to appear as a notification from a crypto exchange service. Users are invited to receive an alleged transfer in cryptocurrency by following a link to a website where they are instructed to contact “blockchain support” and make a “commission” payment in crypto to receive the transfer. Following these instructions could lead to the loss of funds, as the whole “transfer” story is a hoax.

The attackers used Google Forms – a free tool for online surveys – to create a short questionnaire with just one slot to fill in: the email address. The attackers themselves input the victim’s email address into the form, and then Google Forms sends a questionnaire submission confirmation email to the victim. The attackers crafted this form submission confirmation to look like a notification from a crypto transaction service – indicating a sum to allegedly be paid out, urging the user to click on the link to receive the payout before it “expires”.

The scam email contains Google Forms attributes, such as a header with Google Forms logo, a link to the questionnaire (which the user never filled in), and the field value that had been submitted. The attackers bank on the fact that the email passes through spam filters, since it was sent from a legitimate Google address and the user is tricked by a catchy headline.

“This campaign demonstrates a cunning exploitation of a trusted and widely used platform to deliver scam attacks on cryptocurrency users. By crafting fraudulent submission confirmation emails that mimic legitimate notifications from crypto exchanges, attackers used the platform’s credibility to bypass email filters, and also the victim’s unfamiliarity with its format to lure them into divulging sensitive wallet credentials. There is a critical need for users to verify email sources, scrutinise links and adopt robust security measures to protect their digital assets,” comments Andrey Kovtun, Email Threats Protection Group Manager at Kaspersky.

Form-idable foe: Crypto scammers target users through Google Forms

After clicking on the link in the email, the user is directed to a scam website mimicking a crypto transaction platform.

To avoid falling victim to such attacks, Kaspersky recommends:

  • Do not tap or click links in messages you weren’t expecting.
  • Check for any unusual attributes in the email, like those pertaining to Google Forms that were described above.
  • Install a reliable security solution such as Kaspersky Premium that would prevent the user from opening a scam website.
spot_img
spot_img

━ More like this

AI Has Turned Biometric Security Into a Fraud Target, New Data Shows

New data shows nearly 9 in 10 failed identity checks in Southern Africa are linked to AI-driven impersonation.  The systems designed to verify identity and...

Online scam exposure remains widespread despite high levels of self-assurance, Kaspersky reports

A recent Kaspersky survey highlights a considerable gap between consumers’ confidence in identifying online scams and their actual exposure to cyber threats. According to...

Identity under siege: The new order of security in 2026

The threat model has changed as artificial intelligence lowers the barrier to entry for cybercrime. Attack velocity and threat veracity have increased exponentially. Impersonation...

High-severity incidents at a minimum: Kaspersky experts reveal a steady decline over the years

According to the ‘Anatomy of a Cyber World: Global Report by Kaspersky Security Services’, there has been a noticeable decline in the percentage of high-severity incidents...

Kaspersky discovers new SparkCat variant bypassing App Store and Google Play security

 Kaspersky has identified a new variant of the SparkCat Trojan in the App Store and in Google Play — a year after the crypto-stealing...
spot_img