Subscribe to NordVPN through our affiliate link and save up to 72% on 2-year plans. Do it with no fear by knowing that your purchase is protected by a 30-day money-back guarantee.
A new type of phishing attack has recently spread across Google Docs, a tool that allows you to create and edit documents online for free. As with many other similar attacks, the threat arrived via email to many users and requested that they allow access to a shared document using that same tool in order to edit it. Once permissions were granted users would be redirected to a new app which looked exactly like Google Docs, simultaneously granting the attacker access to your emails and possibly other associated services. The attack was quite elaborate and practically undetectable, but fortunately Google acted pretty quickly and the menace was extinguished in no time. This wasn’t enough, however, since the short time it was active was enough to infect 0.1% of Gmail users, which considering Google’s 1 billion customers is roughly the same as saying 1 million people had been affected.
What made this scheme so dangerous was the fact that it was practically undetectable. In fact, Gmail phishing detection standards were not able to stop it since unlike regular phishing attacks – where users are required to type in their passwords – this one was carried out via an Open Authorization (OAuth) exploit. OAuth is a protocol that enables a third-party application to obtain limited access to a HTTP service. In other words this is how different apps communicate between each other, based on your accounts’ range of permissions. Having said that, in this Google Docs attack the perpetrator basically asked for victims’ permission to access their emails, instead of leading them through a path of sketchy password-requirement websites.
Moreover, the fact that a great number of apps rely on this authorization protocol (over 275,000 to be more precise) adds yet another layer of concern to any future similar attacks.
Since this phishing attack exploits OAuth, the first measure you can take for extra security is to review your apps’ permission and manage them suitably. But then again, the large number of apps available using OAuth can become quite difficult to manage, as you’ll probably spend the rest of your life searching for their respective permission management pages. Yet while that’s quite easy with Google since it is one of the biggest companies on Earth, it is quite tricky with smaller companies since your account’s details and permissions are often hidden somewhere in a dark corner of the web.
Given this, make sure you pay attention to which permissions you allow either when installing an app or creating an account and always have a proper antivirus or security suite along with you.
Best Reviews may receive compensation for its content through paid collaborations and/or affiliate links. Learn more about how we sustain our work and review products.
©2012-2025 Best Reviews, a clovio brand –
All rights
reserved
Privacy
policy
·
Cookie
policy
·
Terms
of use
·
Partnerships
· Contact
us
To provide the best experiences, we use technologies like cookies to store and/or access device information and allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
User feedback