4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: Google Docs Hit With Phishing Attack

Warning: Google Docs Hit With Phishing Attack

On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.

Not only does the email look convincing, it’s also often coming from a contact you already know. Even worse, the link takes you to a Google.com URL with a legitimate-looking login screen. However, once you log in with your Google credentials, whoever is behind the attack will have full access to your account.

Once it has them, it sends the same email to your contact list in an attempt to propagate itself. This attack is well-crafted, to the point where the easiest way to catch it before getting snared is to click the small link on the page that Google hosts to check the developer’s information. Since the attack utilizes legitimate Google account functions, however, who would think to check?

Whenever you get an unsolicited email with links or attachments, it’s critical to think before you click!

Fortunately, Google was able to apparently put the kibosh on this attack within an hour of taking action, but there’s still no indication of who was responsible for this attack or if/when they will strike again. Therefore, it is important to understand how to avoid falling victim to emails like this in general.

First, if there’s ever any doubt of an email’s validity, check out some of the indicators that tend to go overlooked. This attack in particular had some oddities--for example, the email was addressed to “hhhhhhhhhhhhhh@mailinator.com.” Secondly, if an email is unexpected, it never hurts to confirm its validity with the sender through an alternate method of communication.

To protect your business, you need to be sure that your staff understands that threats like this could be a major problem. In the meantime, be sure to keep your eyes out for more email-based phishing scams and other threats. If you do come across questionable messages, don’t hesitate to report it immediately, so that everyone on your team becomes cognizant of the threat.

For more information about phishing scams, social engineering tactics, and other attempts to infiltrate your network, contact the IT professionals at 4IT at 305-278-7100 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 11 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware Business Continuity Workplace Tips VoIP Saving Money Computer User Tips Upgrade Windows 10 Miscellaneous Virtualization Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Alert Email Communication Network Save Money Microsoft Office communications Small Business Smartphone Quick Tips Going Green Mobile Office Information Technology Social Media Smartphones BYOD Apps Android Health Office Browser Application Gadgets Ransomware Operating System Chrome Managed IT Services Outsourced IT Managed IT Disaster Tablet Mobility WiFi Holiday Firewall Avoiding Downtime Productivity Spam Best Practice Data Management BDR Risk Management Cybersecurity Cybercrime Search Telephone Systems The Internet of Things Passwords Remote Computing Unified Threat Management IT Solutions Saving Time Remote Monitoring History Employer-Employee Relationship Budget VPN Apple Automation Facebook Vendor Management Hacking Hard Drives Proactive IT Phishing Law Enforcement Password Data Backup User Error iPhone Hosted Solution Customer Relationship Management Computers Collaboration Recovery Phone System Wireless Technology Money Big Data Office Tips Marketing Data Recovery Content Filtering Encryption Analytics Shortcut Gmail Router Social Humor Government Administration Work/Life Balance Wearable Technology Lithium-ion battery Maintenance Office 365 PowerPoint Telephony Virus Current Events Printer Bring Your Own Device Vulnerability USB Antivirus Point of Sale Data Protection Business Intelligence IT COnsultant Computer Repair App Cost Management Social Engineering Intranet Data Security Bandwidth Printer Server Laptop Politics Private Cloud Users Personal Information OneNote Windows 8 Trending Education Net Neutrality Wireless Unsupported Software Google Drive SaaS Cloud Computing Tech Support Audit HaaS Save Time Outlook Travel Identity Theft Solid State Drive Workplace Data Storage Flexibility Sports Streaming Media Update Customer Service Biometrics Uninterrupted Power Supply Retail online currency Virtual Reality Meetings Samsung Wi-Fi Emergency Artificial Intelligence Applications Emails Social Networking Instant Messaging HIPAA Entertainment hacker Efficency Benefits Transportation DDoS Computer Accessories Compliance Robot Computer Care Mouse Battery IT Support Display Automobile Two-factor Authentication Windows 10 End of Support Managing Stress Augmented Reality Excel Network Congestion Internet Exlporer Paperless Office Help Desk Internet of Things Fax Server Managed IT Services IT Technicians Adobe Google Docs Computer Fan SharePoint Employer Employee Relationship Nokia Operating Sysytem Licensing Worker Commute Microsoft Excel Dark Web PDF Teamwork Screen Mirroring Scalability Files Busines Continuity Twitter Networking File Sharing Safety Near Field Communication Text Messaging Chromecast Surge Protector Cast How To Windows 10s Television Upgrades Human Resources systems IT consulting Nanotechnology 3D Printing Administrator Running Cable Training Hard Disk Drive Colocation Consultant Tablets hack The Blindside Of Reliable Computing Root Cause Analysis Hard Drive Access Company Culture HBO Black Market ISP best practices Touchscreen Bloatware NFL Cortana IT Security CrashOverride Uograde Images Blogging Cleaning IT Management Programming Word Experience data breach Branding Legislation Keyboard Settings Avoid Downtime Website Distributed Denial of Service WIndows Server 2008 Windows Ink Music risk management Hiring/Firing WIndows 7 Inbound Marketing Data storage eWaste Storage Patch Management OneDrive Google Maps Books Regulations Amazon Wiring Smart Technology Commerce Video Games Information Co-managed IT Value Regulation Document Management Software as a Service Data Breach Cameras Advertising Debate Lifestyle User Legal Touchpad Ebay Mobile Device Science Sync Virtual Desktop Data Loss Managed Security Presentation iOS Computing Bluetooth Scam Best Available Managed IT Service Taxes Redundancy Webinar Tutorial Supercomputer Buisness Electronic Medical Records Credit Cards IT solutions IT Budget Mobile FAQ Reputation Professional Services Gift Giving Microblogging Youtube Shadow IT Relocation Sales Managed Service Provder Webinar Comparison IT service Specifications Domains Conferencing Gifts