4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Warning: Google Docs Hit With Phishing Attack

Warning: Google Docs Hit With Phishing Attack

On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.

Not only does the email look convincing, it’s also often coming from a contact you already know. Even worse, the link takes you to a Google.com URL with a legitimate-looking login screen. However, once you log in with your Google credentials, whoever is behind the attack will have full access to your account.

Once it has them, it sends the same email to your contact list in an attempt to propagate itself. This attack is well-crafted, to the point where the easiest way to catch it before getting snared is to click the small link on the page that Google hosts to check the developer’s information. Since the attack utilizes legitimate Google account functions, however, who would think to check?

Whenever you get an unsolicited email with links or attachments, it’s critical to think before you click!

Fortunately, Google was able to apparently put the kibosh on this attack within an hour of taking action, but there’s still no indication of who was responsible for this attack or if/when they will strike again. Therefore, it is important to understand how to avoid falling victim to emails like this in general.

First, if there’s ever any doubt of an email’s validity, check out some of the indicators that tend to go overlooked. This attack in particular had some oddities--for example, the email was addressed to “hhhhhhhhhhhhhh@mailinator.com.” Secondly, if an email is unexpected, it never hurts to confirm its validity with the sender through an alternate method of communication.

To protect your business, you need to be sure that your staff understands that threats like this could be a major problem. In the meantime, be sure to keep your eyes out for more email-based phishing scams and other threats. If you do come across questionable messages, don’t hesitate to report it immediately, so that everyone on your team becomes cognizant of the threat.

For more information about phishing scams, social engineering tactics, and other attempts to infiltrate your network, contact the IT professionals at 4IT at 305-278-7100 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Business Computing Internet software Hackers Hosted Solutions Productivity Backup Business Management Managed Service Provider Malware Business Google IT Services Innovation Efficiency Windows IT Support Workplace Tips Hardware Saving Money Disaster Recovery Miscellaneous VoIP Windows 10 Business Continuity Upgrade Computer Virtualization Mobile Devices Data Mobile Computing User Tips Mobile Device Management Server Save Money Communication Quick Tips Network Security Network Smartphones Going Green Mobile Office Alert Email Information Technology Social Media communications Microsoft Office Office BYOD Smartphone Apps Small Business Health Application Operating System Gadgets Firewall Android Ransomware Managed IT Services Disaster Tablet Browser Chrome The Internet of Things Avoiding Downtime Remote Computing Unified Threat Management Passwords BDR Search WiFi Mobility Holiday Telephone Systems Employer-Employee Relationship IT Solutions Budget Vendor Management Hard Drives Spam Automation Saving Time Outsourced IT Risk Management Hacking Best Practice History Remote Monitoring Data Management VPN Wireless Technology Cybercrime Apple Facebook Big Data Marketing Recovery Productivity Office Tips Customer Relationship Management Password Current Events Computers Telephony Money Printer Bring Your Own Device USB Phone System Content Filtering Analytics Gmail Router Managed IT Humor Administration User Error Cybersecurity Wearable Technology Law Enforcement Lithium-ion battery Antivirus iPhone Collaboration Maintenance PowerPoint Social Users Trending Education Social Engineering Net Neutrality Windows 8 Hosted Solution Wireless Tech Support Private Cloud Cloud Computing Encryption Save Time Point of Sale Proactive IT IT COnsultant Government App Computer Repair Cost Management HaaS Intranet Work/Life Balance Bandwidth Printer Server Laptop Virus Phishing Virtual Reality hacker Personal Information Transportation Display Emails Computer Care Battery Instant Messaging Robot Augmented Reality HIPAA Entertainment Unsupported Software Automobile Benefits End of Support Paperless Office DDoS Computer Accessories Network Congestion Google Drive Outlook Fax Server Mouse Internet Exlporer Workplace Help Desk Streaming Media Internet of Things Identity Theft Two-factor Authentication Solid State Drive Managing Stress Uninterrupted Power Supply SaaS Flexibility online currency Audit Samsung Business Intelligence Shortcut Social Networking Update Office 365 Customer Service Efficency Biometrics OneNote Retail Busines Continuity Uograde Company Culture Images Black Market Access Networking Near Field Communication best practices Touchscreen Politics IT Security Meetings Website Cleaning Human Resources IT consulting data breach Experience Keyboard Running Cable Avoid Downtime OneDrive Amazon Reliable Computing Co-managed IT risk management Music Hiring/Firing Wiring Information Bloatware Data storage Windows 10 Books Smart Technology Video Games Ebay Debate Computing Document Management Branding Advertising Vulnerability Data Breach Distributed Denial of Service Legal Compliance Mobile Device Touchpad WIndows 7 iOS Managed Security Scam eWaste Inbound Marketing Regulations Nokia Computer Fan Data Protection Twitter Employer Employee Relationship Excel Sports Value Cameras Worker Commute Operating Sysytem PDF User Dark Web Surge Protector Television Scalability Science Files 3D Printing Presentation Virtual Desktop Safety Bluetooth Text Messaging Best Available Data Backup IT Technicians How To Chromecast Travel Windows 10s Upgrades Wi-Fi Emergency SharePoint Artificial Intelligence ISP Nanotechnology Training Hard Drive Administrator Colocation Hard Disk Drive Consultant Applications The Blindside Of Teamwork Programming Blogging Root Cause Analysis CrashOverride Sales Shadow IT Relocation Managed Service Provder Webinar Lifestyle Tutorial Storage Managed IT Services Taxes IT service Webinar Supercomputer Domains Electronic Medical Records IT solutions IT Budget Reputation Gift Giving Buisness Youtube Microblogging