Twollow
  • Tech
    Social Media APIs

    Harnessing Social Media APIs to Unlock the Power of Digital Connections

    medical call center

    Essential Tips to Improve Engagement for Private Podcasts

    How to Transfer Photos From iPhone to Mac Without USB

    6 Ways How to Transfer Photos From iPhone to Mac Without USB

    Best Camera Accessories You Should Get

    Best Camera Accessories You Should Get

    AC filter

    4 reasons to change your AC filters regularly

    HOS ELD Mandate

    What is an ELD? What is a HOS ELD Mandate? 

    UX designers

    Which Tech Career is Right for You?

    outlook email

    Pro Tips on Troubleshooting Microsoft Outlook PST File Issues 

    VoIP Technology

    5 Ways VoIP Technology Lowers Costs for Small Businesses

  • Apps
    News Mobile App

    Best Practices For Creating Engaging News Mobile App

    app development

    InsiderTech No:1 Web Application Development

    Efficient Hosting Solutions

    Why Businesses Should Use Highly Efficient Hosting Solutions for Their Sites

    How To Build Android Apps With Node JS Using Android JS

    How To Build Android Apps With Node JS Using Android JS

    Is Powerapps Service The Future Of App Development?

    How To Make Night In Little Alchemy

    How To Make Night In Little Alchemy?

    How To Make Light In Little Alchemy

    How To Make Light In Little Alchemy?

    How To Make Glass In Little Alchemy

    How To Make Glass In Little Alchemy?

    How to Make a Blade in Little Alchemy

    How to Make a Blade in Little Alchemy?

  • How To
    unit trusts

    How to Invest in Singapore Unit Trusts

    How To Unlock All Gun Skins in free Fire With Lulubox

    How To Unlock All Gun Skins in free Fire With Lulubox

    solar panels

    Common Solar Panel Concerns and How to Deal With Them

    imei number

    How to Check IMEI Number?

    bong

    How do you manufacture a bong?

    Central heating

    DIY Guide: How To Install A Designer Radiator

    website

    Things That Might Be Wrong With Your Website And How To Fix Them

    design a business logo

    How to Design a Successful Business Logo

    How Live Streaming works

    How Live Streaming works – Everything You Need to Know

  • Business
    • All
    • Finance
    right web development team

    How to Build the Right Web Development Team for the Next Project?

    supply chain design

    Ways To Keep Supply Chain Sustainable

    smartcards

    What can an immigration lawyer do for you?

    How is Barter Network Relevant in Modern Businesses

    How is Barter Network Relevant in Modern Businesses

    Finding time

    12 Benefits of Using a Container Tracking System

    How to Prepare Your Business for Growth

    New Year, New Opportunities: How to Prepare Your Business for Growth

    online business

    How to Take Advantage of Enterprise Podcasting to Leverage Your Team

    Business is Suffering from Storage Issues

    4 Tips if your Business is Suffering from Storage Issues

    Hiring a Workplace Investigator

    5 Situations That Call for Hiring a Workplace Investigator

  • Marketing
    SMM Panel

    Why Groom Insta is the Best SMM Panel Worldwide for Social Media Marketers

    How Technology Helps Companies Sales Department

    How Technology Helps Companies Sales Department

    Free Templates

    The Trap of Free Templates: Are Cookie-Cutter WordPress Websites Really Enough?

    Create a Twitter Marketing Strategy

    Get Seen: A 7-Step Plan on How to Create a Twitter Marketing Strategy

    How to Successfully Market a Medical Device

    How to Successfully Market a Medical Device

    video making

    How to use Stock Videos in Commercial Projects?

    social media results

    How to Connect with Other Businesses on Social Media

    SharePoint Gantt Chart Web Part

    SharePoint Gantt Chart Web Part

    Reasons To Sell Your Products On Amazon

    Seven Reasons To Sell Your Products On Amazon

  • General
    lawsuit against Tylenol

    The class action lawsuit against Tylenol

    wearing motorcycle jacket while riding

    5 Types Of Motorcycle Jackets For Riding

    AI

    5 Benefits of Intelligent Construction Sequencing

    people in the world are on the edge of hunger

    47 million people in the world are on the edge of hunger

    Crystal Smoking Pipes

    Top 4 Healing Properties Of Crystal Smoking Pipes That You Must Know

    kratom business

    Can Super Indo Kratom Help Boost Your Energy This Winter?

    cbd

    Is Dabbing CBD Isolate A Safe Option For Beginners?

    Steps to a Successful Garage Door Repair

    Steps to a Successful Garage Door Repair

    IRS tax

    What Is TROP (Term Plan With Return Of Premium)?

  • Reviews
    Development of Cryptocurrency

    A Crypto.com Overview

    Ophthalmology eyesight examination

    Red Light Therapy Devices for Eyes: Where to Buy

    text to speech

    Best Text to Speech Converters Reviewed

    air purifier

    Where Can You Find the Best Air Cleaner Pro Reviews?

    How to Choose a Cheap Hosting

    Liquid Web Reviews: A Look At A Reliable Hosting Company

    Ionic Training

    Get Ionic Training and Improve Your Career Options

    Learning Experience

    Salesforce DX myTrailhead to Customize the Learning Experience

    Best Web Hosting Services

    10 Best Web Hosting Services 2018

    Honey Chrome Extension Review

    Honey Chrome Extension Review – Is It Scam Or Real?

  • Featured
No Result
View All Result
  • Tech
    Social Media APIs

    Harnessing Social Media APIs to Unlock the Power of Digital Connections

    medical call center

    Essential Tips to Improve Engagement for Private Podcasts

    How to Transfer Photos From iPhone to Mac Without USB

    6 Ways How to Transfer Photos From iPhone to Mac Without USB

    Best Camera Accessories You Should Get

    Best Camera Accessories You Should Get

    AC filter

    4 reasons to change your AC filters regularly

    HOS ELD Mandate

    What is an ELD? What is a HOS ELD Mandate? 

    UX designers

    Which Tech Career is Right for You?

    outlook email

    Pro Tips on Troubleshooting Microsoft Outlook PST File Issues 

    VoIP Technology

    5 Ways VoIP Technology Lowers Costs for Small Businesses

  • Apps
    News Mobile App

    Best Practices For Creating Engaging News Mobile App

    app development

    InsiderTech No:1 Web Application Development

    Efficient Hosting Solutions

    Why Businesses Should Use Highly Efficient Hosting Solutions for Their Sites

    How To Build Android Apps With Node JS Using Android JS

    How To Build Android Apps With Node JS Using Android JS

    Is Powerapps Service The Future Of App Development?

    How To Make Night In Little Alchemy

    How To Make Night In Little Alchemy?

    How To Make Light In Little Alchemy

    How To Make Light In Little Alchemy?

    How To Make Glass In Little Alchemy

    How To Make Glass In Little Alchemy?

    How to Make a Blade in Little Alchemy

    How to Make a Blade in Little Alchemy?

  • How To
    unit trusts

    How to Invest in Singapore Unit Trusts

    How To Unlock All Gun Skins in free Fire With Lulubox

    How To Unlock All Gun Skins in free Fire With Lulubox

    solar panels

    Common Solar Panel Concerns and How to Deal With Them

    imei number

    How to Check IMEI Number?

    bong

    How do you manufacture a bong?

    Central heating

    DIY Guide: How To Install A Designer Radiator

    website

    Things That Might Be Wrong With Your Website And How To Fix Them

    design a business logo

    How to Design a Successful Business Logo

    How Live Streaming works

    How Live Streaming works – Everything You Need to Know

  • Business
    • All
    • Finance
    right web development team

    How to Build the Right Web Development Team for the Next Project?

    supply chain design

    Ways To Keep Supply Chain Sustainable

    smartcards

    What can an immigration lawyer do for you?

    How is Barter Network Relevant in Modern Businesses

    How is Barter Network Relevant in Modern Businesses

    Finding time

    12 Benefits of Using a Container Tracking System

    How to Prepare Your Business for Growth

    New Year, New Opportunities: How to Prepare Your Business for Growth

    online business

    How to Take Advantage of Enterprise Podcasting to Leverage Your Team

    Business is Suffering from Storage Issues

    4 Tips if your Business is Suffering from Storage Issues

    Hiring a Workplace Investigator

    5 Situations That Call for Hiring a Workplace Investigator

  • Marketing
    SMM Panel

    Why Groom Insta is the Best SMM Panel Worldwide for Social Media Marketers

    How Technology Helps Companies Sales Department

    How Technology Helps Companies Sales Department

    Free Templates

    The Trap of Free Templates: Are Cookie-Cutter WordPress Websites Really Enough?

    Create a Twitter Marketing Strategy

    Get Seen: A 7-Step Plan on How to Create a Twitter Marketing Strategy

    How to Successfully Market a Medical Device

    How to Successfully Market a Medical Device

    video making

    How to use Stock Videos in Commercial Projects?

    social media results

    How to Connect with Other Businesses on Social Media

    SharePoint Gantt Chart Web Part

    SharePoint Gantt Chart Web Part

    Reasons To Sell Your Products On Amazon

    Seven Reasons To Sell Your Products On Amazon

  • General
    lawsuit against Tylenol

    The class action lawsuit against Tylenol

    wearing motorcycle jacket while riding

    5 Types Of Motorcycle Jackets For Riding

    AI

    5 Benefits of Intelligent Construction Sequencing

    people in the world are on the edge of hunger

    47 million people in the world are on the edge of hunger

    Crystal Smoking Pipes

    Top 4 Healing Properties Of Crystal Smoking Pipes That You Must Know

    kratom business

    Can Super Indo Kratom Help Boost Your Energy This Winter?

    cbd

    Is Dabbing CBD Isolate A Safe Option For Beginners?

    Steps to a Successful Garage Door Repair

    Steps to a Successful Garage Door Repair

    IRS tax

    What Is TROP (Term Plan With Return Of Premium)?

  • Reviews
    Development of Cryptocurrency

    A Crypto.com Overview

    Ophthalmology eyesight examination

    Red Light Therapy Devices for Eyes: Where to Buy

    text to speech

    Best Text to Speech Converters Reviewed

    air purifier

    Where Can You Find the Best Air Cleaner Pro Reviews?

    How to Choose a Cheap Hosting

    Liquid Web Reviews: A Look At A Reliable Hosting Company

    Ionic Training

    Get Ionic Training and Improve Your Career Options

    Learning Experience

    Salesforce DX myTrailhead to Customize the Learning Experience

    Best Web Hosting Services

    10 Best Web Hosting Services 2018

    Honey Chrome Extension Review

    Honey Chrome Extension Review – Is It Scam Or Real?

  • Featured
No Result
View All Result
Twollow
No Result
View All Result

Cybersecurity: Scammers Now Use Google Docs for Phishing Attacks

by Tom Fogden
March 11, 2020 - Updated on July 28, 2021
0
Phishing Attacks
Share on FacebookShare on Twitter

Google Docs is popular amongst users from different industries. It is the most comprehensive alternative to the Microsoft Office Suite. As per usual, cybercriminals have realized the potential of using this service to attack users and steal their data. According to a recent report from Cofense, cybercriminals found a smart way to trick users into opening phishing emails. They disguise them as Google Docs requests.

Hackers have been using cloud services to deliver malware for a while now. Every time they get more and more creative with their approaches. Users should educate themselves on this latest exploit, so they would avoid falling victim to it. Here’s all you need to know.

How Are Cybercriminals Abusing Google Docs to Exploit Users?

These phishing emails come from a hacked automated email account. It has privileged access to CIM Finance, a well-known finance service provider. Hackers knew that having access to CIM Finance’s account will allow them to bypass all email protection checks. So they decided to attempt it on a much larger scale.

Once the malicious actors accessed their website, they used it to send a large number of fraudulent emails. They looked as notifications from the IT department, notifying users that their Office 365 license has expired and urging to renew it. Before that, hackers had set up a fake Microsoft form hosted on Google Forms, with an authentic SSL certificate.

It tricked users into thinking that they’re actually accessing Microsoft’s official page. And it resulted in them entering their login credentials. Little did they know that their account details are going somewhere else entirely.

How to Recognize These Phishing Efforts?

Hackers are quite detailed in their efforts to trick users. But there are still a couple of giveaways that you should be aware of. For one, they capitalize half of the words without any logical explanation or reason. Then, they also replace some letters with asterisks. And finally, when you enter your login credentials on these fraudulent pages, usernames and passwords appear in plain text. A reputable company would never allow it.

Moreover, Scamicide has reported another way that hackers use to exploit Google Docs. Victims would receive an email that says something along the lines of “John Doe sent you a document via Google Docs.” Once the users open the link, the culprits gain access to all their emails and contact lists.

You can recognize this by checking the sender’s email address or by checking the name of the person who had allegedly sent the document.

How to Protect Yourself from Phishing?

Phishing has become one of the most popular ways of stealing user data. Everyone should educate themselves on warning signs and implement other security measures. Here are some suggestions:

Browse securely with SSL/HTTPS:-

“You can install an SSL certificate like Comodo PositiveSSL Wildcard on the website to secure sensitive information online, such as credit card or banking details. Before visiting any website you should check that website is secured by SSL Certificate or not. In your web Browser address bar you can check padlock symbol for security. This padlock symbol can show that your established connections are secured.”

Don’t Open Suspicious Emails and Links

If you see an email from a company or a service that requests your login credentials or tries to forward you to another page, don’t open it nor click it. Always check the sender’s email address first and never download anything before checking. Or go to their website directly to see if there are any messages for you,

Use Antivirus and VPN Software

Antivirus software can protect you from phishing attempts by scanning, recognizing, or terminating connection from suspicious websites. Meanwhile, VPNs encrypt your traffic, which deems it unusable to hackers. Some VPN providers, such as NordVPN, also come with CyberSec features that block access to known phishing sites. And they also have lots of privacy-related perks, but that’s a different story.

Use Two-Factor Authentication

It is useful because, even if the user had fallen victim to a phishing attack, the hacker wouldn’t be able to access their account. They would need a second step to do it, for example, one-time pin code from an app or email.

Employ a Sender Policy Framework

Sender Policy Framework is an email authentication tool designed to detect and block fraudulent emails. It is useful for large companies, where the number one cause of data breaches is human error.

User vigilance and education on potential threats and risks are also vital for ensuring a risk-free online environment. The digital world is full of dangers and malicious actors who want to gain profit by exploiting companies and individuals.

Your sensitive information has a massive value on the dark market, so hackers keep coming up with new ways of how to steal it. Prevention and diligence are the most important aspects of maintaining one’s online safety.

Tags: CybersecurityPhishing Attacks
Tom Fogden

Tom Fogden

Tom Fogden is a writer for Twollow with a range of experience in the world of tech publishing. Tom covers everything from cybersecurity, to social media and website builders when he's not reviewing the latest phones, gadgets, or occasionally even technology books.

Related Posts

Best Practices and Security Tips
Security

DeFi Security: Best Practices and Security Tips

DeFi development is becoming more and more popular, with developers transferring from established traditional organizations to crypto startups. However, security...

by John Morris
December 30, 2022
Warehouse Security Tips
Security

Safe and Compliant: 5 Warehouse Security Tips

It takes more than fundamentals to practice proper workplace safety. Good protocols are in place, but their execution is completely...

by Haris V.
October 25, 2022
it security
Security

Is Your Company’s IT Department Properly Testing All Security Measures?

You may be under the impression that your company's IT department is doing everything possible to secure your data. However,...

by Tom Fogden
September 9, 2022 - Updated on October 17, 2022
Proactive Cybersecurity
Security

4 Reasons Why Educational Institutions Need Proactive Cybersecurity

Cybercrime has been on the rise for a number of years now but has been rife since the start of...

by Tom Fogden
July 25, 2022

Recommended

Social Media APIs

Harnessing Social Media APIs to Unlock the Power of Digital Connections

January 27, 2023
lawsuit against Tylenol

The class action lawsuit against Tylenol

January 26, 2023
wearing motorcycle jacket while riding

5 Types Of Motorcycle Jackets For Riding

January 26, 2023

Who We Are

Twollow is one of the leading tech and business blogs, that is dedicated towards updated Technology & Business news, reviews, Apps, how-to, smart tricks, and tweaks.

Follow Us

  • Facebook

Categories

  • Apps
  • Business
  • Education
  • Featured
  • Finance
  • General
  • How To
  • Marketing
  • Reviews
  • Security
  • Tech
  • Uncategorized

Top Posts & Pages

  • Damon Salvatore Rule 34: Everything You Need To Know 
    Damon Salvatore Rule 34: Everything You Need To Know 
  • 100+ Free Premium Minecraft Accounts & Passwords (Tested 2022)
    100+ Free Premium Minecraft Accounts & Passwords (Tested 2022)
  • How to Get Free Virtual Phone Number for WhatsApp Installation
    How to Get Free Virtual Phone Number for WhatsApp Installation
  • How Much Weight is Allowed in a 20 ft and 40 ft Container?
    How Much Weight is Allowed in a 20 ft and 40 ft Container?
Social Media APIs

Harnessing Social Media APIs to Unlock the Power of Digital Connections

January 27, 2023
lawsuit against Tylenol

The class action lawsuit against Tylenol

January 26, 2023
wearing motorcycle jacket while riding

5 Types Of Motorcycle Jackets For Riding

January 26, 2023
  • About Us
  • Contact Us
  • Terms of Use
  • Privacy Policy
  • Disclaimer
  • Cookie Privacy Policy

No Result
View All Result
  • Home
  • Security