ForumsGeneralThe AppShell Gambit: Abusing Google AppSheet for Credential Harvesting

The AppShell Gambit: Abusing Google AppSheet for Credential Harvesting

Proxy_Admin_Nate 5/2/2026 USER

Just caught the report on Guardio's 'AccountDumpling' operation. It’s a textbook case of attackers abusing legitimate SaaS infrastructure to bypass traditional filters. Essentially, they are using Google AppSheet—a no-code platform—as a phishing relay.

By routing phishing traffic through AppSheet's legitimate domains, the attackers ensure that emails and landing pages pass reputation checks and SPF/DKIM validations. The 30,000 compromised Facebook accounts are likely just the tip of the iceberg since the infrastructure itself is trusted.

The Mechanism

The actors likely host a phishing form that uses AppSheet scripts to capture input and relay it to their backend, or simply use the AppSheet domain to host the intermediary page. This makes URL filtering incredibly difficult; blocking appsheet.com isn't an option for many orgs using Google Workspace.

Detection Strategy

We need to look for behavioral anomalies rather than just signatures. I'm currently working on a query to identify suspicious interactions with AppSheet endpoints that don't match typical internal app usage patterns.

Here is a basic KQL snippet to identify high-frequency requests to AppSheet from a single source, which might indicate an automated harvesting tool or a user interacting with a phishing link:

let AppSheetBase = 'appsheet.com';
let TimeFrame = 1h;
let Threshold = 50;
DeviceNetworkEvents
| where Timestamp > ago(TimeFrame)
| where RemoteUrl contains AppSheetBase
| where InitiatingProcessFileName in ('chrome.exe', 'msedge.exe', 'firefox.exe')
| summarize Count = count() by DeviceName, InitiatingProcessAccountName, RemoteUrl
| where Count > Threshold
| project DeviceName, Account, RemoteUrl, Count

This isn't a silver bullet, but it helps spot outliers. Has anyone else started seeing SaaS-to-phishing relays in their environment? How are you handling the balance between blocking malicious abuse and allowing legitimate low-code tool usage?

BU
BugBounty_Leo5/2/2026

We've seen a similar uptick with legitimate survey tools (Typeform, etc.) being used for initial recon, but the AppSheet relay is a new level of bold. The KQL query is a solid start, but you might also want to cross-reference with IdentityLogonEvents to see if those same users are triggering MFA challenges immediately after accessing the AppSheet URL. That 'click -> login' correlation is usually the smoking gun for credential harvesting.

MS
MSP_Owner_Rachel5/2/2026

It’s frustrating because our devs love AppSheet for rapid prototyping. Blanket banning is out of the question. We’re looking at implementing strict CASB policies that only allow specific AppSheet App IDs that we have whitelisted. Anything outside that list gets blocked. It adds admin overhead, but it's the only way to stop the 'trusted domain' abuse without killing productivity.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created5/2/2026
Last Active5/2/2026
Replies2
Views98