Hackers exploiting Google Docs, Outlook users at most risk

Date:

Hackers are sending malicious links through comments in Google apps like Docs and Slides primarily to Outlook users — a known vulnerability that has not been fully closed or mitigated by Google since last year, cyber-security researchers have warned.

According to US-based enterprise cybersecurity company Avanan, hackers are increasingly using Google Docs’ productivity features to slip malicious links past spam filters and cyber security tools.

In June last year, Avanan reported on an exploit in Google Docs that allowed hackers to easily deliver malicious phishing websites to end-users. Now, hackers have found a new way to do the same thing.

“Starting in December 2021, Avanan observed a new, massive wave of hackers leveraging the comment feature in Google Docs, targeting primarily Outlook users,” said researcher Jeremy Fuchs.

The comment feature across the Google suite has become an attack vector for hackers, he claimed in a report.

Avanan said it notified Google of this flaw on January 3, via the report phish through email button within Gmail.

Google was yet to react to the report.

In one such attack, hackers add a comment to a Google Doc. The comment mentions the target with an ‘@’. By doing so, an email is automatically sent to that person’s inbox.

“In that email, which comes from Google, the full comment, including the bad links and text, is included. Further, the email address isn’t shown, just the attackers’ name, making this ripe for impersonators,” said the report that came out on Thursday.

“In this email attack, hackers found a way to leverage Google Docs, and other Google collaboration tools, to send malicious links. We primarily saw it target Outlook users, though not exclusively. It hit over 500 inboxes across 30 tenants, with hackers using over 100 different Gmail accounts,” it elaborated.

To guard against these attacks, before clicking on Google Docs comments, users should cross-reference the email address in the comment to ensure it’s legitimate.

“Utilise standard cyber hygiene, including scrutinising links and inspecting grammar and deploy protection that secures the entire suite, including file-sharing and collaboration apps,” said the researchers.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Popular

More like this
Related

Swedish Player Insights: Exploring Live Dealer Games at LuckyDays Casino

Explore a Swedish player's take on live dealer games at LuckyDays Casino. Discover top games and unique features!

Evaluating Winnitt Casino’s Customer Support: A Comprehensive Guide for Dutch Players

Discover how Winnitt Casino supports Dutch players with top-notch customer service and efficient solutions.

Unveiling Slotit’s Welcome Bonuses and Promotions: A Detailed Review for Gamers

Discover the best deals at Slotit with our detailed review of the latest welcome bonuses and promotions. Play smarter, win bigger!

Discasino’s Comprehensive Guide to Ensuring Player Safety: Security Measures and Fair Gaming Revealed

Explore Discasino's top security measures & fair gaming practices for player safety. Stay informed!