4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: Google Docs Hit With Phishing Attack

Warning: Google Docs Hit With Phishing Attack

On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.

Not only does the email look convincing, it’s also often coming from a contact you already know. Even worse, the link takes you to a Google.com URL with a legitimate-looking login screen. However, once you log in with your Google credentials, whoever is behind the attack will have full access to your account.

Once it has them, it sends the same email to your contact list in an attempt to propagate itself. This attack is well-crafted, to the point where the easiest way to catch it before getting snared is to click the small link on the page that Google hosts to check the developer’s information. Since the attack utilizes legitimate Google account functions, however, who would think to check?

Whenever you get an unsolicited email with links or attachments, it’s critical to think before you click!

Fortunately, Google was able to apparently put the kibosh on this attack within an hour of taking action, but there’s still no indication of who was responsible for this attack or if/when they will strike again. Therefore, it is important to understand how to avoid falling victim to emails like this in general.

First, if there’s ever any doubt of an email’s validity, check out some of the indicators that tend to go overlooked. This attack in particular had some oddities--for example, the email was addressed to “hhhhhhhhhhhhhh@mailinator.com.” Secondly, if an email is unexpected, it never hurts to confirm its validity with the sender through an alternate method of communication.

To protect your business, you need to be sure that your staff understands that threats like this could be a major problem. In the meantime, be sure to keep your eyes out for more email-based phishing scams and other threats. If you do come across questionable messages, don’t hesitate to report it immediately, so that everyone on your team becomes cognizant of the threat.

For more information about phishing scams, social engineering tactics, and other attempts to infiltrate your network, contact the IT professionals at 4IT at 305-278-7100 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Innovation IT Support Hardware Workplace Tips Disaster Recovery Saving Money Business Continuity Virtualization Upgrade Windows 10 Computer Miscellaneous VoIP User Tips Data Mobile Devices Server Mobile Device Management Mobile Computing Email Save Money Communication Network Security Network Quick Tips Alert BYOD communications Going Green Microsoft Office Mobile Office Social Media Smartphones Information Technology Office Apps Smartphone Small Business Health Android Application Ransomware Browser Outsourced IT Gadgets Operating System Firewall Disaster Avoiding Downtime Tablet Managed IT Services Chrome The Internet of Things Remote Computing Risk Management Unified Threat Management Productivity IT Solutions Managed IT Spam WiFi BDR Search Mobility Passwords Holiday Vendor Management Telephone Systems Employer-Employee Relationship Facebook Budget Hard Drives Automation History Remote Monitoring Saving Time Hacking Best Practice Data Management Marketing VPN Wireless Technology Cybercrime Hosted Solution Computers Big Data Phone System Recovery Customer Relationship Management Cybersecurity Office Tips Apple Phishing Password Current Events Money Telephony Printer Humor Administration USB Content Filtering Wearable Technology iPhone Analytics Maintenance PowerPoint Gmail Router Proactive IT Virus Law Enforcement User Error Antivirus Lithium-ion battery Collaboration Social Bring Your Own Device Social Engineering Trending Education Net Neutrality Point of Sale Wireless IT COnsultant Unsupported Software Private Cloud Google Drive Computer Repair Cloud Computing Tech Support Save Time Outlook Encryption App Government Work/Life Balance Users HaaS Cost Management Intranet Windows 8 Business Intelligence Bandwidth Office 365 Shortcut Printer Server Laptop OneNote Meetings Network Congestion Robot Computer Care Battery Help Desk Emails Instant Messaging Automobile Display End of Support HIPAA Entertainment Benefits Augmented Reality DDoS Computer Accessories Internet Exlporer Paperless Office Mouse IT Support Compliance Internet of Things Fax Server Identity Theft Data Protection Workplace Solid State Drive Social Networking Flexibility Two-factor Authentication Streaming Media Managing Stress SaaS Excel Uninterrupted Power Supply online currency Audit Samsung Data Storage Update Customer Service Biometrics Efficency hacker Data Backup Retail Personal Information Virtual Reality Transportation Experience Nanotechnology Keyboard Avoid Downtime Data Security Human Resources Website IT consulting Hard Disk Drive Music Running Cable Root Cause Analysis Hiring/Firing HBO Data storage Reliable Computing best practices OneDrive Books Amazon CrashOverride Nokia Smart Technology Video Games Bloatware IT Management Co-managed IT Document Management data breach Data Breach Advertising Settings Legal WIndows Server 2008 Branding Ebay Touchpad risk management Mobile Device Managed Security Distributed Denial of Service Computing Scam Patch Management WIndows 7 Windows 10 eWaste Commerce Inbound Marketing Sports Regulations Employer Employee Relationship Regulation Hard Drive Worker Commute Operating Sysytem Vulnerability PDF Data Recovery Value Sync Files Cameras Scalability Images User iOS Twitter Uograde Safety Text Messaging Science Managed IT Service Chromecast Presentation Managed IT Services Surge Protector How To Virtual Desktop Wi-Fi Bluetooth Best Available Computer Fan Television Upgrades Emergency IT Technicians 3D Printing Artificial Intelligence Travel Administrator Training Applications SharePoint Colocation Dark Web Consultant The Blindside Of Screen Mirroring Access Company Culture Wiring ISP Black Market Politics Teamwork Information Touchscreen IT Security Cast Busines Continuity Blogging Near Field Communication Windows 10s Debate Cleaning Programming Networking Relocation Lifestyle Taxes Storage IT service Tutorial Supercomputer Electronic Medical Records Microblogging Youtube Domains IT Budget Adobe Sales Reputation Managed Service Provder Webinar Webinar IT solutions Gift Giving Buisness Shadow IT