• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

Expeditious Recovery of Google Docs from Phishing attack

{{postValue.id}}

Google wasted no time to mitigate a major fast spreading phishing attack which snuck into the google’ s gmail and docs last Wednesday. The attack was planned to snaffle users’ personal information like login IDs and passwords of millions of users. Google came up with security measure which will prompt an error/warning message whenever a user clicks on any malicious link.

In a post on the G Suite Updates blog titled, “ Making email safer with anti-phishing security checks in Gmail on Android,” Google has promised to launch a new security feature which will help the user to find out the unlawful sites that the user tries to reveal the personal information.

Many credible sources have stated that Google was able to find a solution for the attack within an hour of initial reports. The attack just lasted for a few minutes.

Researchers from Talos, Cisco’ s threat intelligence organization, wrote that the attackers focused on requesting specific permissions to " Read, send, delete, and manage" email and contacts instead of just acquiring the victim' s Google username and password or drop some kind of malware.

The immediate and easy solution for these kinds of attack is to change the password and revoke access to the fraudulent " Google Docs" app in the Google Account settings. Although Google has come up quick measures to sort the issue, finding out appropriate security measures for Gmail' s apps on iOS and the web is much needed.

Tags:
eli
Author: 

Comments ( 1 )

lourdesperdon
Can it somehow related to the fact that my Gmail is no longer working in Chrome? Or it is yet another problem? I am so tired of all this, you know.
Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 5 )

Q

where to find the actual mail in google?

A

Google wants people—without opening the email—to report it as phishing. Do this by clicking on the right hand corner of the email—again without opening it—where The Telegraph says a drop down menu will allow you to "report phishing."

Q

why Remove the app—and others that don't look right?

A

Click the remove button and voila! You should be all set. As BGR also says, take a look to see if there other apps that don't look familiar to you, or have access to more than you like. If you still feel unsafe, you can run a Google Security Checkup for additional verification.

However, just because you got rid of that pesky hack doesn't mean it won't happen in the future. Here are some more tips on how you can spot future suspicious schemes and "phish-y" emails.

Q

Recovery of Google Docs from Phishing attack read the below news?

A

Educate yourself on how phishing works and what the new techniques are. Up-to-date tech websites and popular media outlets can provide you with this information. Even tips such as "Never give out personal information" and "Be wary of suspicious links" can go a long way.

Even though Google responded quickly on the same day the phishing happened, more than a million users were still affected so really, everyone is on their own in some way while dealing with these scams. Remember — anyone can be the subject of hacking so don't be embarrassed or discouraged. Instead, educate yourself on how phishing works and what you can do to prevent further attacks.

Q

How does stegware malware exploit steganography techniques?

A

Researchers at the 2018 RSA Conference discussed the increasing availability of malware that uses steganography, dubbed stegware. Discover how this works with expert Nick Lewis.

Q

How does MassMiner malware infect systems across the web?

A

Similar to ransomware attacks, cryptocurrency mining is a way for criminals to monetize their attacks. While cryptocurrency mining usually causes less collateral damage than ransomware, mining malware may be more difficult to detect.

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Elijah ?
Remote Desktop Connection Has Stopped Working

When accessing my remote machine server using remote desktop on a windows machine I am getting this error

forum (1)

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.