/
Google Apps Phishing Attacks

Google Apps Phishing Attacks


Introduction

Most phishing attacks try to gain access to your personal information by getting your username and password.

But another type of phishing attack tries to trick you into granting access to your email account through your Google Drive permissions.

This page explains what these attacks look like, and how to spot them.

Reminder: Alertness is the key to avoiding cyber attacks.


Suspicious Email Message

The attack starts with a suspicious email that includes an unfamiliar email address and a button to open a Google Doc. In some cases, there might not be a personal message in the email. The message will usually come from a trusted email address, like a friend or colleague.

If you weren't expecting a document of this nature from that particular person, you should question the email message.


Permission Request

If you click on the button from the email message, your Internet browser will prompt you with a Google permission request.

Anytime you're prompted to grant permissions for an application, make sure to read and understand the request before clicking the Allow button. If you are unsure, contact the IT Helpdesk for help.

Pay attention to the person or application requesting access permissions. In the example above, the hacker used a malicious application with the name "Google Docs" to trick users into trusting the request. If you were to click on the "Google Docs" link, it would show the sender's actual email address:

The hacker is also using a malicious website (googledocs.g-cloud.pro), hoping that you will believe it's a legitimate Google Docs site.


Check Your Google Apps Security

Use Google’s Security Checkup tool to review what apps you have connected to your Google Account. https://g.co/SecurityCheckup

If you want help with Google's tool, contact the IT Helpdesk at 4740 or it.helpdesk@biola.edu.


Related content

About Phishing Attacks
About Phishing Attacks
More like this
Protect Yourself from Phishing Attacks
Protect Yourself from Phishing Attacks
More like this
Safe Computing
Safe Computing
More like this
How to Share Files with Google Drive
How to Share Files with Google Drive
More like this
Google Workspace FAQ
Google Workspace FAQ
More like this
Department Email Services
Department Email Services
More like this