{"id":16497,"date":"2018-02-04T08:00:41","date_gmt":"2018-02-04T13:00:41","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=16497"},"modified":"2022-04-28T09:39:42","modified_gmt":"2022-04-28T13:39:42","slug":"how-do-phishing-attacks-via-google-docs-work","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/how-do-phishing-attacks-via-google-docs-work\/","title":{"rendered":"How Do Phishing Attacks via Google Docs Work?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">If you&#8217;re savvy on digital tech trends, you may have noticed the highly publicized phishing attack that occurred in early 2017 that gained access to Google accounts via Google Docs. The report affected millions of people, and required Google to send out a notification warning users to ignore the phishing request and to change their permissions quickly. This shows how important it is to not only be aware of the latest scams, but to take measures to block phishing attempts. To protect your phone from these kind of hacks use dfndr security\u2019s anti-hacking feature:<\/span><\/p>\n<p><center><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=Blog&amp;c=How_Do_Phishing_Attacks_via_Google_Docs_Work\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15001 size-full\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/10\/Activate_Anti_Hacking.png\" alt=\"\" width=\"439\" height=\"57\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/10\/Activate_Anti_Hacking.png 439w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/10\/Activate_Anti_Hacking-300x39.png 300w\" sizes=\"auto, (max-width: 439px) 100vw, 439px\" \/><\/a><center><\/center><\/center>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">If you like the idea of having an antivirus app block malicious links before you even click on them, the anti-hacking feature does just that. So how did this Google Docs attack work, and what can users do in the future to sniff out future attacks before they happen, in addition to using anti-hacking? Continue reading to find out more about Google Docs phishing attacks.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/google-play-protect-fails-to-deliver-only-stops-65-percent-of-malware\/\"><b>Google Play Protect Fails to Deliver \u2013 Only Stops 65.8% of Malware<\/b><\/a><\/p>\n<p><b>How This Attack Worked<br \/>\n<\/b><span style=\"font-weight: 400;\">First, the initial issue that caused this was a minor one, and it stemmed from a simple email that appeared as if it was sent by a recent contact. The email then encouraged individuals to open and log in with their Google account. The page that users were delivered to looked exactly identical to the normal Google permission pages, which is what caused so many users to grant and fall for the attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, once they had signed over their information, it was too late. Hackers were able to use the information and passwords for whatever they wanted, and users were left scrambling to change their information and ungrant permissions. Of course, while <\/span><a href=\"http:\/\/money.cnn.com\/2017\/05\/03\/technology\/google-docs-phishing-attack\/index.html\"><span style=\"font-weight: 400;\">the attack targeted less than .1%<\/span><\/a><span style=\"font-weight: 400;\"> of Gmail users, that still means that millions of people were at risk, and many clicked on the link.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, there&#8217;s a lot to learn about this that users can use to protect themselves in the future. First and foremost, users should be careful and always think twice about sharing their information. If an email takes you to a page looking for information that you&#8217;ve likely already shared on your computer, you may have encountered the phishing page. Maintaining a healthy skepticism is key to staying vigilant and on top of attacks that may be incoming.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Looking to better understand some of the phishing attacks on Google Docs that have dominated the headlines recently? Here&#8217;s how they work.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[162,106,259,149],"class_list":["post-16497","post","type-post","status-publish","format-standard","hentry","category-security","tag-antivirus","tag-google","tag-hackers","tag-phishing"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=16497"}],"version-history":[{"count":2,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16497\/revisions"}],"predecessor-version":[{"id":18011,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16497\/revisions\/18011"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=16497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=16497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=16497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}