Spam campaign targets Google users with
malicious link
Send a link to a friend
[May 04, 2017]
By Jim Finkle and Alastair Sharp
(Reuters) - Alphabet Inc <GOOGL.O> warned
its users to beware of emails from known contacts asking them to click
on a link to Google Docs after a large number of people turned to social
media to complain that their accounts had been hacked.
Google said on Wednesday that it had taken steps to protect users from
the attacks by disabling offending accounts and removing malicious
pages.
The attack used a relatively novel approach to phishing, a hacking
technique designed to trick users into giving away sensitive
information, by gaining access to user accounts without needing to
obtain their passwords. They did that by getting an already logged-in
user to grant access to a malicious application posing as Google Docs.
"This is the future of phishing," said Aaron Higbee, chief technology
officer at PhishMe Inc. "It gets attackers to their goal ... without
having to go through the pain of putting malware on a device."
He said the hackers had also pointed some users to another site, since
taken down, that sought to capture their passwords.
Google said its abuse team "is working to prevent this kind of spoofing
from happening again."
Anybody who granted access to the malicious app unknowingly also gave
hackers access to their Google account data including emails, contacts
and online documents, according to security experts who reviewed the
scheme.
"This is a very serious situation for anybody who is infected because
the victims have their accounts controlled by a malicious party," said
Justin Cappos, a cyber security professor at NYU Tandon School of
Engineering.
[to top of second column] |
A security guard keeps watch as he walks past a logo of Google in
Shanghai, China, April 21, 2016. REUTERS/Aly Song/File Photo
Cappos said he received seven of those malicious emails in three
hours on Wednesday afternoon, an indication that the hackers were
using an automated system to perpetuate the attacks.
He said he did not know the objective, but noted that compromised
accounts could be used to reset passwords for online banking
accounts or provide access to sensitive financial and personal data.
(Reporting by Alastair Sharp and Jim Finkle in Toronto; editing by
Grant McCool)
[© 2017 Thomson Reuters. All rights
reserved.]
Copyright 2017 Reuters. All rights reserved. This material may not be published,
broadcast, rewritten or redistributed.
|