Hackers Exploit Google Docs For Phishing Attacks

Share post:

Attackers are abusing the comment feature in Google Docs to spread malicious emails.

The comment feature helps people collaborate on the same documents. Attackers add a comment to a Google document and then mention the target by typing the @ icon followed by an email address.

The full comment contains a malicious link that can cause a malicious infection once activated.

The phishing attack was discovered by Avanan in December 2021 and targeted more than 500 mailboxes in 30 different organizations.

The attackers used more than 100 Gmail accounts to carry out their nefarious activities. Microsoft Outlook users and recipients of other email platforms have been on the receiving end of the attack.

To protect users from this phishing campaign, Avanan gave them tips to follow, including cross-referencing email addresses before clicking on them, checking links and looking for grammatical errors.

Others involve contacting the actual sender for confirmation and ensuring that users and their organizations have strong security protections.

For more information, read the original story in TechRepublic.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways