How to stay safe from the massive Google Docs phishing scam

India Ashok
Google Docs phishing attack

A massive phishing scam hit Google account holders on Wednesday (3 May). The first wave of attacks reportedly hit journalists, businesses and universities before spreading to other users. The attack reportedly involved victims receiving an email from a friend or someone they know, which came with a malicious Google docs attachment. When clicked on, the link redirected victims to a Google docs fake app, which was designed to hijack accounts.

According to reports, the fake Google docs app requested users to authorise it to access shared documents. However, in reality, the fake malicious app sought access to victims' Gmail inbox and contacts list. Motherboard reported that the fake app came with self-propagating capabilities and automatically sent out more emails to other users. The self-propagating feature ensured that the attacks spread like wildfire in a very short time.

Trending: 'Shameful' social media firms slammed for not tackling hate crime postings

Reports indicated that the attack, which was first reported in a Reddit thread, was highly sophisticated. The fake Google docs app had been designed to accurately replicate an authentic one. ArsTechnica reported that the only way to figure out that the email was part of a scam campaign was to click on the down arrow next to the Google docs name. Clicking on this revealed that the developer was not Google but a random individual using the email ""

Motherboard reported that Google Drive was also down at the time of the attacks. However, it is unclear if the outage was related to the attack in any way.
However, it took Google a mere hour after users began reporting the attacks on social media, to pull up their sleeves and get cracking on fixing the issue.

Don't miss: Samsung Galaxy S8 review: More than just a pretty face

"We have taken action to protect users against an email impersonating Google Docs, and have disabled offending accounts," Google said in a statement. "We've removed the fake pages, pushed updates through Safe Browsing, and our abuse team is working to prevent this kind of spoofing from happening again."

How to stay safe?

Most popular: After holding Netflix hostage, hacker group claims Fox, IFC and ABC next on their list

In case you already clicked on the malicious link, fret not, there is a way to fix the issue. Go to the permissions page in your Google account and revoke access to Google Docs by locating the fake Google Docs app. The fake app should have a recent "Authorisation Time". Click on the app and then click on "Remove." This process ensures that infected victims can manually remove the malicious app.

"The importance of this phish is not how it spread, but rather how it didn't use malware or fake websites tricking users to give up their passwords," Aaron Higbee, chief technology officer at the phishing research and defense company PhishMe, which analyzed data from the fake Google Docs campaign, told Wired. "This phish worked because it tricked the user into granting permissions to a third-party application. This is the future of phishing, and every security technology vendor is ill-equipped to deal with it."

Higbee's comments highlight that it is more important than ever for users to be aware of emerging cyberthreats and to incorporate safe security practices when dealing with emails. It also becomes highly imperative for users to know how to spot fake emails. For a quick, comprehensive guide on how to identify fake emails and stay safe from phishing campaigns, click here.

You may be interested in: