Connect with us

Hi, what are you looking for?

News

Hackers are using Google Docs as another dangerous platform for phishing attacks

Hackers are using Google Docs as another dangerous platform for phishing attacks

Hackers are currently using the Google Docs platform as a platform to host targeted phishing attacks by sending redirect links. An article published on the Avanan blog shows how Google Docs can be used as a tool to prevent phishing attacks against other members of the community. The email will be sent to the user via the link.

The excuse for submission is that the topic is a downloadable document provided on Google Docs, and users are encouraged to download and read in their spare time. To make matters worse, when you click on a link, the website below matches Google Docs, adding more false legitimacy to the hacker’s phishing attempt. The landing page URL will prompt the user to download the “document”.

When users log in to a login portal like Google, they blush. People can add their own credentials when trying to disclose personal information. Although tech-savvy people find it difficult to succumb to such attacks, especially because robots are easily distinguished by harsh, inhuman conversations, copying Google documents and logging in to the portal is a ball game.

Or those who are not familiar with the online space can easily become the victim of an attack. The legality of the created websites is strengthened by the creation of them by Google Docs. All the hacker has to do is write HTML similar to Google Docs. And upload it to Google Drive.

After uploading to Google Drive, HTML will be automatically converted to a document preview webpage. From there, the hacker opened the HTML code in Google Docs. This is where things pile up. A bit technical. By using the existing web embedding and publishing features in Google Docs, you will more or less generate a URL that hackers will use and send to unsuspecting users.

Hackers are using Google Docs as another dangerous platform for phishing attacks

Image Credit: Digital Information World

OVERVIEW:

After Wasim Akram, Shoaib Akhtar steps into Crypto World With His own NFT

The excuse for submission is that the topic is a downloadable document provided on Google Docs, and users are encouraged to download and read in their spare time. All the hacker has to do is write HTML similar to Google Docs. By using the existing web embedding and publishing features in Google Docs, you will more or less generate a URL that hackers will use and send to unsuspecting users.

Advertisement. Scroll to continue reading.
Content Protection by DMCA.com
ameenasaeed99@gmail.com'
Written By

An experienced web content writer who loves to cover trendy and latest news. More than it she also in different blog writing and Amazon listing. Looking forward for better opportunities to fill the writing world with her own pen.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

News

In the past few years, Elon Musk’s fame and popularity have grown rapidly, and this name has been on everyone’s lips. Well, Musk is...

Gaming

With the rapid growth of the number of Internet users year by year and in-depth understanding of consumer online behavior, the most visited websites...

Apps

Google’s new Android application data recovery tool is not new because it is installed on many mobile phones. Most tech-savvy people will see this...

Apps

Facebook is taking some general measures for women, whether as part of its employees or as part of its community, to ensure that they...