4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: Google Docs Hit With Phishing Attack

Warning: Google Docs Hit With Phishing Attack

On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.

Not only does the email look convincing, it’s also often coming from a contact you already know. Even worse, the link takes you to a Google.com URL with a legitimate-looking login screen. However, once you log in with your Google credentials, whoever is behind the attack will have full access to your account.

Once it has them, it sends the same email to your contact list in an attempt to propagate itself. This attack is well-crafted, to the point where the easiest way to catch it before getting snared is to click the small link on the page that Google hosts to check the developer’s information. Since the attack utilizes legitimate Google account functions, however, who would think to check?

Whenever you get an unsolicited email with links or attachments, it’s critical to think before you click!

Fortunately, Google was able to apparently put the kibosh on this attack within an hour of taking action, but there’s still no indication of who was responsible for this attack or if/when they will strike again. Therefore, it is important to understand how to avoid falling victim to emails like this in general.

First, if there’s ever any doubt of an email’s validity, check out some of the indicators that tend to go overlooked. This attack in particular had some oddities--for example, the email was addressed to “hhhhhhhhhhhhhh@mailinator.com.” Secondly, if an email is unexpected, it never hurts to confirm its validity with the sender through an alternate method of communication.

To protect your business, you need to be sure that your staff understands that threats like this could be a major problem. In the meantime, be sure to keep your eyes out for more email-based phishing scams and other threats. If you do come across questionable messages, don’t hesitate to report it immediately, so that everyone on your team becomes cognizant of the threat.

For more information about phishing scams, social engineering tactics, and other attempts to infiltrate your network, contact the IT professionals at 4IT at 305-278-7100 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 24 May 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Hackers Backup Productivity Business Management Hosted Solutions Managed Service Provider Business Malware IT Services Google Innovation Efficiency IT Support Windows Hardware Workplace Tips Saving Money Disaster Recovery Upgrade Windows 10 Miscellaneous VoIP Computer Virtualization Business Continuity Data Mobile Devices User Tips Server Mobile Computing Mobile Device Management Communication Save Money Quick Tips Network Network Security Going Green Mobile Office Information Technology Email Alert communications Health Apps Office Small Business Microsoft Office Smartphone Social Media Smartphones BYOD Operating System Gadgets Disaster Application Ransomware Tablet Firewall Browser Managed IT Services Search Android Holiday Avoiding Downtime WiFi Remote Computing Unified Threat Management Passwords Mobility Risk Management Telephone Systems Employer-Employee Relationship Chrome The Internet of Things Remote Monitoring History Automation Outsourced IT IT Solutions Hard Drives Hacking Saving Time Best Practice BDR Data Management Vendor Management Cybercrime VPN Wireless Technology Budget Recovery Customer Relationship Management Facebook Productivity Big Data Office Tips Spam Apple Marketing Password Lithium-ion battery Collaboration Computers Humor Telephony Administration Money Current Events Wearable Technology iPhone Phone System Maintenance PowerPoint Printer Managed IT USB Content Filtering Analytics Router Law Enforcement Gmail Antivirus Bring Your Own Device Social User Error Bandwidth Point of Sale Printer Server Social Engineering IT COnsultant Hosted Solution Laptop Computer Repair Wireless Private Cloud Trending Education Net Neutrality Save Time Virus Tech Support Users Windows 8 Encryption HaaS Cybersecurity Work/Life Balance Proactive IT Government Cost Management Intranet Phishing Virtual Reality hacker Help Desk Personal Information Transportation Efficency Instant Messaging Battery Emails Robot OneNote HIPAA Automobile Entertainment Unsupported Software Benefits End of Support DDoS Computer Accessories Cloud Computing Google Drive Display Social Networking Internet Exlporer Mouse Internet of Things Two-factor Authentication Identity Theft Paperless Office Managing Stress Solid State Drive Flexibility SaaS Fax Server Outlook Workplace Streaming Media Samsung App Uninterrupted Power Supply Shortcut Business Intelligence online currency Customer Service Office 365 Update Network Congestion Biometrics Retail Black Market Busines Continuity Access 3D Printing Company Culture Touchscreen Networking Politics Near Field Communication Meetings IT Security Cleaning Human Resources Experience Nokia IT consulting ISP Running Cable Keyboard Avoid Downtime Computer Care Blogging Music Reliable Computing Programming Hiring/Firing Bloatware Data storage Website Books Smart Technology Video Games Document Management Branding Data Breach Advertising OneDrive Legal Compliance Amazon Distributed Denial of Service Mobile Device Windows 10s Touchpad Hard Drive Co-managed IT Augmented Reality Managed Security WIndows 7 Inbound Marketing eWaste Scam Uograde Hard Disk Drive Regulations Images Ebay Data Protection Value Sports Computing Employer Employee Relationship Excel Worker Commute best practices Cameras Operating Sysytem User PDF Audit Science Scalability Files Virtual Desktop data breach Presentation Bluetooth Safety Best Available Text Messaging How To Travel Chromecast Wiring IT Technicians Upgrades Wi-Fi Information risk management Twitter SharePoint Emergency Artificial Intelligence Debate Administrator Training Consultant Surge Protector Applications Colocation Television Teamwork The Blindside Of Vulnerability Shadow IT Gift Giving iOS Relocation Managed IT Services Webinar IT solutions Microblogging Youtube Storage Taxes Lifestyle IT service Sales Supercomputer Managed Service Provder Domains Electronic Medical Records Webinar IT Budget Tutorial Reputation Buisness Windows 10