4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: Google Docs Hit With Phishing Attack

Warning: Google Docs Hit With Phishing Attack

On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.

Not only does the email look convincing, it’s also often coming from a contact you already know. Even worse, the link takes you to a Google.com URL with a legitimate-looking login screen. However, once you log in with your Google credentials, whoever is behind the attack will have full access to your account.

Once it has them, it sends the same email to your contact list in an attempt to propagate itself. This attack is well-crafted, to the point where the easiest way to catch it before getting snared is to click the small link on the page that Google hosts to check the developer’s information. Since the attack utilizes legitimate Google account functions, however, who would think to check?

Whenever you get an unsolicited email with links or attachments, it’s critical to think before you click!

Fortunately, Google was able to apparently put the kibosh on this attack within an hour of taking action, but there’s still no indication of who was responsible for this attack or if/when they will strike again. Therefore, it is important to understand how to avoid falling victim to emails like this in general.

First, if there’s ever any doubt of an email’s validity, check out some of the indicators that tend to go overlooked. This attack in particular had some oddities--for example, the email was addressed to “hhhhhhhhhhhhhh@mailinator.com.” Secondly, if an email is unexpected, it never hurts to confirm its validity with the sender through an alternate method of communication.

To protect your business, you need to be sure that your staff understands that threats like this could be a major problem. In the meantime, be sure to keep your eyes out for more email-based phishing scams and other threats. If you do come across questionable messages, don’t hesitate to report it immediately, so that everyone on your team becomes cognizant of the threat.

For more information about phishing scams, social engineering tactics, and other attempts to infiltrate your network, contact the IT professionals at 4IT at 305-278-7100 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 October 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Disaster Recovery Innovation IT Support Hardware Workplace Tips Business Continuity Saving Money Computer VoIP Upgrade Miscellaneous Windows 10 Virtualization User Tips Mobile Devices Mobile Device Management Data Server Network Security Mobile Computing Email Alert Communication Network Save Money Microsoft Office communications Quick Tips Mobile Office Information Technology Social Media Smartphones Smartphone BYOD Going Green Apps Small Business Health Android Office Outsourced IT Browser Gadgets Operating System Chrome Application Ransomware Managed IT Services Tablet Firewall Avoiding Downtime Disaster Productivity BDR Managed IT Risk Management Data Management Search Cybersecurity WiFi Cybercrime Holiday Mobility The Internet of Things Telephone Systems Remote Computing Passwords Unified Threat Management IT Solutions Spam Hacking Best Practice History Remote Monitoring VPN Apple Employer-Employee Relationship Budget Facebook Automation Vendor Management Hard Drives Saving Time User Error iPhone Customer Relationship Management Collaboration Law Enforcement Phishing Password Hosted Solution Wireless Technology Computers Recovery Big Data Phone System Marketing Office Tips Proactive IT Humor Administration Antivirus Shortcut Wearable Technology Social Lithium-ion battery Maintenance PowerPoint Virus Office 365 Data Recovery Current Events Telephony Printer Money Bring Your Own Device USB Data Backup Content Filtering Analytics Encryption Router Gmail Audit App HaaS Government Computer Repair Cost Management Business Intelligence Intranet Bandwidth Work/Life Balance Printer Server Laptop OneNote Social Engineering Users Education Trending Windows 8 Net Neutrality Private Cloud Tech Support Wireless Unsupported Software Outlook Cloud Computing Google Drive Data Security Point of Sale Save Time IT COnsultant Internet of Things Uninterrupted Power Supply Identity Theft online currency Data Protection Solid State Drive Flexibility Travel Update Customer Service IT Support Biometrics Retail Social Networking Windows 10 Samsung Virtual Reality Wi-Fi Efficency Meetings Emergency Vulnerability Applications Emails Instant Messaging Politics hacker Personal Information HIPAA Entertainment Display Transportation Data Storage Benefits DDoS Computer Accessories Battery Robot Augmented Reality Computer Care Compliance Paperless Office Mouse Automobile Network Congestion End of Support Fax Server Two-factor Authentication Help Desk Managing Stress Workplace Internet Exlporer SaaS Excel Streaming Media Nokia HBO Managed Security User NFL best practices Scam Science CrashOverride Virtual Desktop Presentation Twitter IT Management Bluetooth Best Available Sports Surge Protector Word IT Technicians data breach Employer Employee Relationship Settings Worker Commute Operating Sysytem Television WIndows Server 2008 SharePoint 3D Printing PDF Scalability Files Windows Ink risk management Patch Management Teamwork Safety Text Messaging ISP How To Busines Continuity Chromecast Google Maps Commerce Upgrades Networking Hard Drive Near Field Communication Regulation Artificial Intelligence Programming Blogging Administrator Training Consultant Human Resources Images IT consulting Colocation Uograde Sync Running Cable The Blindside Of Black Market Website Access Data Loss iOS Company Culture Managed IT Service Touchscreen Reliable Computing Adobe Managed IT Services IT Security OneDrive Computer Fan Cleaning Bloatware Experience Amazon Co-managed IT Licensing Keyboard Avoid Downtime Wiring Dark Web Information Screen Mirroring Branding Music Distributed Denial of Service Hiring/Firing Ebay Data storage Debate Cast Books WIndows 7 Computing Inbound Marketing eWaste Windows 10s Smart Technology Video Games Nanotechnology Document Management Regulations Data Breach Advertising Legal Value Tablets Hard Disk Drive Root Cause Analysis Mobile Device Cameras Touchpad Domains Taxes Supercomputer Electronic Medical Records IT Budget Buisness Gift Giving Reputation Software as a Service Microblogging Youtube Sales Managed Service Provder Shadow IT Google Docs Webinar Relocation Webinar Microsoft Excel Lifestyle Mobile IT solutions File Sharing Professional Services Storage IT service Tutorial