4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: Google Docs Hit With Phishing Attack

Warning: Google Docs Hit With Phishing Attack

On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.

Not only does the email look convincing, it’s also often coming from a contact you already know. Even worse, the link takes you to a Google.com URL with a legitimate-looking login screen. However, once you log in with your Google credentials, whoever is behind the attack will have full access to your account.

Once it has them, it sends the same email to your contact list in an attempt to propagate itself. This attack is well-crafted, to the point where the easiest way to catch it before getting snared is to click the small link on the page that Google hosts to check the developer’s information. Since the attack utilizes legitimate Google account functions, however, who would think to check?

Whenever you get an unsolicited email with links or attachments, it’s critical to think before you click!

Fortunately, Google was able to apparently put the kibosh on this attack within an hour of taking action, but there’s still no indication of who was responsible for this attack or if/when they will strike again. Therefore, it is important to understand how to avoid falling victim to emails like this in general.

First, if there’s ever any doubt of an email’s validity, check out some of the indicators that tend to go overlooked. This attack in particular had some oddities--for example, the email was addressed to “hhhhhhhhhhhhhh@mailinator.com.” Secondly, if an email is unexpected, it never hurts to confirm its validity with the sender through an alternate method of communication.

To protect your business, you need to be sure that your staff understands that threats like this could be a major problem. In the meantime, be sure to keep your eyes out for more email-based phishing scams and other threats. If you do come across questionable messages, don’t hesitate to report it immediately, so that everyone on your team becomes cognizant of the threat.

For more information about phishing scams, social engineering tactics, and other attempts to infiltrate your network, contact the IT professionals at 4IT at 305-278-7100 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Business Management Hosted Solutions Managed Service Provider Malware Google IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP Mobile Devices Computer User Tips Saving Money Miscellaneous Windows 10 Virtualization Network Security Upgrade Mobile Device Management Data Server communications Email Mobile Computing Alert Communication Save Money Network Microsoft Office Social Media Quick Tips Smartphone Small Business Smartphones BYOD Going Green Managed IT Services Outsourced IT Mobile Office Information Technology Android Office Health Apps Application Ransomware Operating System Chrome Browser Gadgets Mobility Productivity Disaster Managed IT Holiday Tablet Firewall The Internet of Things Cybersecurity Avoiding Downtime WiFi IT Solutions Cybercrime Spam Data Recovery Telephone Systems BDR Passwords Search Data Backup Risk Management Best Practice History Data Management Remote Computing Unified Threat Management Hard Drives Apple Saving Time Employer-Employee Relationship Budget Vendor Management Marketing Automation VPN Hacking Remote Monitoring Facebook Password Content Filtering Hosted Solution Computers Proactive IT Money Recovery User Error Phone System Collaboration Office Tips Wireless Technology iPhone Customer Relationship Management Law Enforcement Big Data Phishing USB Analytics Encryption Vulnerability Gmail Router Telephony Government Bring Your Own Device Intranet Lithium-ion battery Humor Administration Current Events Wearable Technology Antivirus Work/Life Balance Shortcut Maintenance PowerPoint Social Virus Printer Office 365 Users Social Engineering Outlook Politics Windows 8 Personal Information App Private Cloud Wireless Unsupported Software Cost Management Cloud Computing Google Drive Bandwidth Point of Sale Printer Server Save Time IT COnsultant Laptop OneNote SaaS Computer Repair Data Protection Data Security Flexibility Audit HaaS Education Trending Net Neutrality Business Intelligence Tech Support Paperless Office Applications IT Support Virtual Reality Meetings Windows 10 Fax Server hacker Transportation Workplace Emails Instant Messaging Streaming Media Computer Care Data Loss Battery Robot HIPAA Entertainment Uninterrupted Power Supply Benefits online currency Automobile DDoS Computer Accessories Network Congestion Redundancy Data Storage End of Support Compliance Mouse Help Desk Data Breach Internet Exlporer Two-factor Authentication Internet of Things Managing Stress Efficency Identity Theft Excel Solid State Drive Sports Travel Display Samsung Social Networking Wi-Fi Update Customer Service Artificial Intelligence Biometrics Augmented Reality Emergency Retail Images Busines Continuity Consultant Lifestyle Colocation Uograde Patch Management Networking Near Field Communication Ebay The Blindside Of Company Culture Google Maps Black Market Access Computing Touchscreen Commerce Regulation Human Resources IT consulting IT Security Cleaning Software as a Service Running Cable Experience Sync Avoid Downtime Reliable Computing Keyboard iOS Wiring Music Managed IT Service Information Bloatware Adobe Managed IT Services Twitter Hiring/Firing Google Docs Computer Fan Data storage Debate Surge Protector Books Smart Technology Licensing Video Games Branding Television Microsoft Excel Document Management Distributed Denial of Service Dark Web 3D Printing Advertising Screen Mirroring Legal WIndows 7 Inbound Marketing Mobile Device File Sharing eWaste Touchpad Storage Nokia ISP Regulations Managed Security Cast Scam Windows 10s Value systems Nanotechnology Programming Cameras Blogging Employer Employee Relationship Tablets Hard Disk Drive User hack Worker Commute Root Cause Analysis Operating Sysytem Science HBO PDF Virtual Desktop Presentation Website NFL Scalability Bluetooth best practices Files Best Available Cortana IT Technicians CrashOverride IT Management Text Messaging OneDrive Safety Project Management Word How To SharePoint data breach Chromecast Amazon Hard Drive Co-managed IT Upgrades Legislation Settings WIndows Server 2008 MSP Training Windows Ink Teamwork risk management Administrator Comparison Workers Blockchain Sales Specifications Managed Service Provder Updates Identities Shadow IT Webinar Conferencing Relocation Microsoft Word Tutorial Gifts Device Security Webinar Devices Credit Cards Mobile IT solutions Spyware FAQ Gift Giving Professional Services IT service Fraud Taxes Charger Edge Domains Supercomputer Wireless Charging Electronic Medical Records Ciminal IT Budget WannaCry Reputation Buisness Evernote Microblogging Youtube