Cybercriminals were observed exploiting Google Looker Studio to create counterfeit cryptocurrency phishing websites. Through this, attackers aim to deceive recipients into revealing their crypto wallet login details. Check Point recommends implementing a comprehensive security posture with document and file scanning abilities and deploying a solid URL protection system.