Disclaimer: We sustain our work & review products through paid collaborations.
New Phishing Scheme on Google Docs Affects 1 Million Users

New Phishing Scheme on Google Docs Affects 1 Million Users


A new type of phishing attack has recently spread across Google Docs, a tool that allows you to create and edit documents online for free. As with many other similar attacks, the threat arrived via email to many users and requested that they allow access to a shared document using that same tool in order to edit it. Once permissions were granted users would be redirected to a new app which looked exactly like Google Docs, simultaneously granting the attacker access to your emails and possibly other associated services. The attack was quite elaborate and practically undetectable, but fortunately Google acted pretty quickly and the menace was extinguished in no time. This wasn’t enough, however, since the short time it was active was enough to infect 0.1% of Gmail users, which considering Google’s 1 billion customers is roughly the same as saying 1 million people had been affected.

An undetectable menace

What made this scheme so dangerous was the fact that it was practically undetectable. In fact, Gmail phishing detection standards were not able to stop it since unlike regular phishing attacks – where users are required to type in their passwords – this one was carried out via an Open Authorization (OAuth) exploit. OAuth is a protocol that enables a third-party application to obtain limited access to a HTTP service. In other words this is how different apps communicate between each other, based on your accounts’ range of permissions. Having said that, in this Google Docs attack the perpetrator basically asked for victims’ permission to access their emails, instead of leading them through a path of sketchy password-requirement websites.

Moreover, the fact that a great number of apps rely on this authorization protocol (over 275,000 to be more precise) adds yet another layer of concern to any future similar attacks.

Preventive measures

Up to 73% off NordVPN 2-year plans
NordVPN logo
Subscribe to NordVPN through our affiliate link and save up to 73% on 2-year plans. Do it with no fear by knowing that your purchase is protected by a 30-day money-back guarantee.
Save Up to 73% on NordVPN

Since this phishing attack exploits OAuth, the first measure you can take for extra security is to review your apps’ permission and manage them suitably. But then again, the large number of apps available using OAuth can become quite difficult to manage, as you’ll probably spend the rest of your life searching for their respective permission management pages. Yet while that’s quite easy with Google since it is one of the biggest companies on Earth, it is quite tricky with smaller companies since your account’s details and permissions are often hidden somewhere in a dark corner of the web.

Given this, make sure you pay attention to which permissions you allow either when installing an app or creating an account and always have a proper antivirus or security suite along with you.

Oauth Authentication Logo

Best VPN services of 2025

Editor's choice

NordVPN

Editor's rating:
Easy to use on any device
Extra privacy and file sharing
Comprehensive online protection
Fast and reliable connections
Security

Surfshark

Editor's rating:
Easy to use everywhere
Enhanced online privacy
Fast and secure connections
Protect unlimited devices
Multi-device users

IPVanish

Editor's rating:
Protect all your devices
Ensures user privacy
Help anytime you need it
Strong online protection
Gaming

ExpressVPN

Editor's rating:
Works on all major platforms
Fast, smooth browsing
Easy for anyone to use
Added features for flexibility
Traveling

CyberGhost VPN

Editor's rating:
Enhanced privacy and security
Fair prices
Flexible IP address options
Protects all your devices
Streaming

ZoogVPN

Editor's rating:
Affordable VPN solution
Fast and stable connections
Straightforward platform
Protects your online privacy
Torrenting

Private Internet Access

Editor's rating:
Multiple device compatibility
Keeps your IP address private
Suitable for all users
Tailor settings to your needs
Beginners

TunnelBear

Editor's rating:
Intuitive and easy to use
Extra privacy and security
Blocks trackers and ads
Smooth, fast browsing

Discussions

Share your thoughts, ask questions, and connect with other users. Your feedback helps our community make better decisions.

©2012-2025 Best Reviews, a clovio brand – All rights reserved