Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Geek, I am your Father.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews



IObit Black Friday Sale

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. MusicBee
5. Sergei Strelec's WinPE
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. Visual C++ Redistributable Runtimes AIO Repack
8. McAfee Removal Tool (MCPR)
9. K-Lite Mega Codec Pack
10. Tweaking.com - Windows Repair
More >>

top reads

Star All the New Features Landing in Windows 11 This December

Star Lossless vs Lossy: When FLAC, APE, and ALAC Beat MP3 and When They Don't

Star Google Search Tricks You'll Actually Use in 2025 and Beyond

Star Fresh PC Checklist: First 12 Things to Do On a New Windows 11 Machine

Star Running AI Models Locally: What They Are, Where to Find Them, and How to Get Started

Star Deciding Between Idle State, Sleep Mode, and Shutdown: What's Best for Your PC?

Star How to Fix VMware Workstation "The Update Server Could Not Be Resolved" Error Installing VMware Tools

Star How to Remove Google Gemini from Your Phone (and Your Life)

Star Windows Bloat Removal Guide: Debloat Safely and Keep What You Need

Star Windows 11 Repair Playbook: SFC, DISM, CHKDSK Without Breaking Stuff


MajorGeeks.Com » News » October 2012 » Requesting Sensitive Data Via Google Docs: Phishing Really is That Easy

Requesting Sensitive Data Via Google Docs: Phishing Really is That Easy


Contributed by: Email on 10/18/2012 03:21 PM [ comments Comments ]


Please leave your credit card number, its expiration date and security code, along with your full name and billing address in the comments section of this blog post. You’re obviously not going to do this. You know better, I know better, but there are those who don’t. So many, in fact, that scammers are not only comfortable with and willing to invest in scams no more or less complicated, but they are also confident that the scams will succeed.

Such is the case for a familiar social engineering campaign with a new twist. Securelist’s Vicente Diaz details an email-based scam in which attackers are attempting to pilfer various sensitive data simply by asking for it in a Google Doc attached to a phishing email. As has been a hallmark of traditional email-based phishing campaigns, the malicious link, which in this case leads to a Google Doc, is delivered via an email whose text is written in poorly constructed language. Diaz used an example written in Spanish.

Diaz initially thought the method was a novel one, but he quickly realized the Google Doc technique has already caught-on, in part because of the ease with which Google Docs bypass security products. Diaz notes that the method is also potent due to the seemingly legitimate appearance of Google Docs among victims.

Historically, the malicious links embedded in emails would lead to compromised websites serving malware or to domains masquerading as social media, banking, or other online login pages in order to steal credentials. However, in this case, the questionable link leads to a Google Doc, malicious only in its requests: asking for the usernames, email addresses, passwords, and dates of last access from its victims.

Diaz’s isn’t completely certain what the attackers are after, but he believes they are attempting to steal email authentication credentials.

For those of you unacquainted with how Google Docs work, recipients of a Doc input information, save it, and the updated document is automatically sent back to the Doc’s creator.

Diaz warns this is only the beginning. While Google Docs are a convenient medium for duping the unsuspecting into disclosing information they shouldn’t disclose, they are also convenient for hosting more malicious content like malware and executables.






« Ubuntu 12.10 (Final) released · Requesting Sensitive Data Via Google Docs: Phishing Really is That Easy · Survey: SMBs Remain Blissfully Unfazed by Cyberthreats »




Comments
comments powered by Disqus

MajorGeeks.Com » News » October 2012 » Requesting Sensitive Data Via Google Docs: Phishing Really is That Easy

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition