Best Reviews logo
Best Reviews may receive compensation for its content through paid collaborations. See how we sustain our work & review products.
New Phishing Scheme on Google Docs Affects 1 Million Users

New Phishing Scheme on Google Docs Affects 1 Million Users

By Leo S.Leo S. Verified by Sander D.Sander D. Last updated: July 19, 2024 (0)
Table of contents

A new type of phishing attack has recently spread across Google Docs, a tool that allows you to create and edit documents online for free. As with many other similar attacks, the threat arrived via email to many users and requested that they allow access to a shared document using that same tool in order to edit it. Once permissions were granted users would be redirected to a new app which looked exactly like Google Docs, simultaneously granting the attacker access to your emails and possibly other associated services. The attack was quite elaborate and practically undetectable, but fortunately Google acted pretty quickly and the menace was extinguished in no time. This wasn’t enough, however, since the short time it was active was enough to infect 0.1% of Gmail users, which considering Google’s 1 billion customers is roughly the same as saying 1 million people had been affected.

An undetectable menace

What made this scheme so dangerous was the fact that it was practically undetectable. In fact, Gmail phishing detection standards were not able to stop it since unlike regular phishing attacks – where users are required to type in their passwords – this one was carried out via an Open Authorization (OAuth) exploit. OAuth is a protocol that enables a third-party application to obtain limited access to a HTTP service. In other words this is how different apps communicate between each other, based on your accounts’ range of permissions. Having said that, in this Google Docs attack the perpetrator basically asked for victims’ permission to access their emails, instead of leading them through a path of sketchy password-requirement websites.

Moreover, the fact that a great number of apps rely on this authorization protocol (over 275,000 to be more precise) adds yet another layer of concern to any future similar attacks.

Preventive measures

Up to 72% off NordVPN 2-year plans
NordVPN logo
Subscribe to NordVPN through our affiliate link and save up to 72% on 2-year plans. Do it with no fear by knowing that your purchase is protected by a 30-day money-back guarantee.
Save Up to 74% on NordVPN

Since this phishing attack exploits OAuth, the first measure you can take for extra security is to review your apps’ permission and manage them suitably. But then again, the large number of apps available using OAuth can become quite difficult to manage, as you’ll probably spend the rest of your life searching for their respective permission management pages. Yet while that’s quite easy with Google since it is one of the biggest companies on Earth, it is quite tricky with smaller companies since your account’s details and permissions are often hidden somewhere in a dark corner of the web.

Given this, make sure you pay attention to which permissions you allow either when installing an app or creating an account and always have a proper antivirus or security suite along with you.

Oauth Authentication Logo

Best VPN services of 2025

Editor's choice
NordVPN logo
Editor's rating:
(4.5)
Intuitive multiplatform apps
Double VPN and P2P support
Plenty of security features
Large VPN network with consistent speeds
Security
Surfshark logo
Editor's rating:
(4)
Intuitive multiplatform apps
Double VPN
WireGuard protocol
Outstanding device support
Multi-device users
IPVanish logo
Editor's rating:
(4.5)
Unlimited devices
No-log policy
24/7 support
Reliable security tools
Gaming
ExpressVPN logo
Editor's rating:
(4)
Extensive device support
Exceptional speed
Intuitive apps
Convenient extras
Traveling
CyberGhost VPN logo
Editor's rating:
(4.5)
Suitable for all VPN users
Great security features
Seven simultaneous connections
24/7 customer support
Streaming
ZoogVPN logo
Editor's rating:
(4.5)
24/7 customer service
Competitive price
Good connection speed
Based in Greece
Torrenting
Private Internet Access logo
Editor's rating:
(4.5)
Unlimited devices
DNS leak protection
Suitable for all users
Completely customizable
Beginners
TunnelBear logo
Editor's rating:
(4)
Very easy and fun to use
Kill switch and traffic obfuscato
Browser extensions and Chrome blocker
Good speeds

User feedback

 Leave a reply

Your email address will not be published. Required fields are marked *


Best Reviews

Best Reviews may receive compensation for its content through paid collaborations and/or affiliate links. Learn more about how we sustain our work and review products.

©2012-2025 Best Reviews, a clovio brand – All rights reserved
Privacy policy · Cookie policy · Terms of use · Partnerships · Contact us