Living Off the Land Attack: How Trusted Platforms Are Fueling Phishing

PhishFort Team
PhishFort Team
3 min read
Living Off the Land Attack: How Trusted Platforms Are Fueling Phishing

Key takeaways

  • Living off the land attacks use trusted platforms like Google Sites and Vercel to host phishing pages.
  • Attackers exploit domain reputation and cloud infrastructure to bypass detection.
  • Search engines are increasingly unreliable for navigating to financial platforms.

What Is a Living Off the Land Attack?

A living off the land attack is a technique where attackers use legitimate platforms, tools, or infrastructure to carry out malicious activity instead of building their own.

In phishing, this means hosting fake pages on trusted domains like Google Sites or Vercel, making them extremely difficult to detect.


When Living Off the Land Turns Phishing into a Science

In the world of cybersecurity, we often look for the scary stuff: custom malware, complex zero-day exploits, or suspicious domains. But the most effective attacks today aren’t coming from unknown infrastructure.

They are coming from the tools you use every day.

This is the era of living off the land phishing — a technique where attackers abandon their own infrastructure and instead operate entirely within trusted platforms.


The Infrastructure of Trust

Traditionally, phishing sites were easier to identify. Suspicious domains and poor reputation made detection straightforward.

Today, attackers host phishing pages on platforms like Google Sites, Vercel, Webflow, and Ghost.

They inherit trust by default.

SSL Certificates: These platforms provide valid SSL certificates, making every site appear secure.

Domain Authority: Security systems struggle to block trusted domains like sites.google.com or vercel.app.

Clean Redirects: Attackers use cloud apps to fingerprint visitors and selectively redirect real victims to malicious pages.

For a deeper understanding of how attackers exploit trusted environments, see fake investment platforms


The Search Engine Paradox

Search engines have become part of the attack surface.

Both legitimate brands and attackers bid on the same keywords.

The attacker often wins.

A user searching for platforms like Uniswap or MetaMask may see:

  • A sponsored result from the real brand
  • A sponsored result from an attacker

Both look identical.

Because display URLs can differ from final destinations, users are redirected through trusted platforms before landing on phishing pages.

For general awareness on search-based scams, refer to FTC scam alerts: https://consumer.ftc.gov/scams


Why Search Is No Longer Reliable

Search engines were once the primary gateway to the internet.

Today, they are a high-risk entry point for financial and sensitive platforms.

Attackers target multiple brands simultaneously, creating hundreds of phishing pages hosted on trusted services.

This turns search results into a competitive marketplace where the highest bidder — not the most legitimate source — wins visibility.


Indicators of Compromise

Here are real-world examples of living off the land phishing using Google Sites:

Attacks agains 1inch:

sites\[.\]google\[.\]com/view/1inch-o5
sites\[.\]google\[.\]com/view/1inch-swaps

Attacks agains Aerodrome Finance:

sites\[.\]google\[.\]com/view/aerodrome-o2
sites\[.\]google\[.\]com/view/aerodrome-o3

Attacks against Hyperliquid:

sites\[.\]google\[.\]com/view/hyperliquid-h2
sites\[.\]google\[.\]com/view/hyperliquid-h3

Attacks against Jupiter:

sites\[.\]google\[.\]com/view/jup-dex-v1
sites\[.\]google\[.\]com/view/jup-dex-v2

Attacks against Ledger wallet:

sites\[.\]google\[.\]com/view/ledger-com-live-start
sites\[.\]google\[.\]com/view/ledger-com-starts

Attacks against Morpho Labs: 

sites\[.\]google\[.\]com/view/morpho-dapp-ad-166
sites\[.\]google\[.\]com/view/morpho-dapp-ad-187

Attacks against PancakeSwap:

sites\[.\]google\[.\]com/view/pancakeswap-finance-v3
sites\[.\]google\[.\]com/view/pancakeswap-h1

Attacks against Uniswap:

sites\[.\]google\[.\]com/view/uniswapdex-145
sites\[.\]google\[.\]com/view/uniswapdex-145

How to Protect Yourself

  • Trust the URL, Not the Ad: Sponsored results are a bidding war. The highest bidder is often a thief, not the brand.
  • Cloud Hosting is a Double-Edged Sword: Just because a site is hosted on Vercel, Webflow, or Google Sites does not make it legitimate. Attackers love these platforms because they may bypass traditional security filters!
  • Kill the Search Habit: Never use a search engine to navigate to financial services, crypto exchanges, or sensitive logins like passport renewal, toll tax, tax services and so on.
  • The Power of Bookmarks: Manually find the official URL once, verify it via the brand’s official social media or whitepaper, and bookmark it. From that point on, only use that bookmark to access the site.
  • SEO is Compromised: AI-generated slop and malicious SEO and AEO poisoning mean that the first page of search results is no longer a curated list of the best sites, but a minefield of highest-paying actors. Search engines may also show you completely bogus phone numbers, which are not real!

Final Thoughts

Living off the land attacks succeed because they exploit trust in legitimate platforms.

They don’t break systems. They blend into them.

If attackers are abusing trusted platforms to launch phishing at scale, traditional detection methods are no longer enough.

Learn how to identify and take down phishing infrastructure across trusted domains with PhishFort digital threat protection.

PhishFort Team
Written by PhishFort Team