ALERT: Google Drive Phishing Scam

 In Blog

A new phishing scam is circulating one of the more populated regionsgoogle-login
of the web: Google Drive File Sharing.

Drive Scam Play-by-Play

  • The scam is initiated by the standard email request to view a shared document on Drive, with a subject line: Documents.
  • Opening the email reveals a link to what is said to be a “very important document.”
  • Clicking on the link leads users to a fake Google log-in page, which is essentially identical to the real one.
  • The fake log-in page is even hosted on Google and contains SSL certification.

Users who enter their information and “Sign in” are redirected to an actual Google Doc containing irrelevant information.  At the same time, and in the background, the user’s Google log-in credentials are sent to the scammer’s web server.

Drive Scam Consequences

As Google’s actual log-in page makes clear, your log-in credentials provide access to “One Account.  All of Google.”  That means that users fooled by this recent scam provide attackers with access to everything they do on Google.  Gmail, Google+, Google Calendar, Google Play – all of Google indeed.  This consequence highlights the problem with using just one service provider, and thus one username and password, for all of one’s online activities.  Doing so may make things easier for you, but it also makes things easier for the bad guys.

Drive Scam Protection

Emsisoft Anti-Malware’s Surf Protection technology automatically protects users from malicious servers like the one used in this Google Drive scam.  Surf Protection utilizes a built-in list of dangerous websites that is updated in realtime, and it is completely immune to social engineering tactics like fake log-in pages.

If you have recently logged on to Google through a suspicious email request, Emsisoft recommends that you change your Google password immediately.  Even if you haven’t logged on through such an email, it is important to change any account’s password with some regularity.  Passwords are your first line of defense to Internet security, and when they are weak or reused the truth is that they’re not much good at all.

It is also important to remember that any email containing attachments, links, or requests to share files should be carefully examined before you click.  Emails are common vectors for malware, and messages from anyone but trusted co-workers, family members, or friends should automatically raise suspicion.

Have a Great (Malware-Free) Day!

Recent Posts