Google Docs becomes an effective tool for hackers, Google cant sit and watch

Not long ago, a new computer virus appeared and attacked users around the World. Not WannaCry (extortion virus) but a type of malicious code, spreading through Google Docs and making Google itself helpless , watching its brand be taken advantage of as an effective tool, aiding the bad guys.

 

 

It's impossible to pinpoint, but the virus was called by the method it used to attack the victim, the Google Docs virus. Specifically, when it has penetrated into any computer, it will automatically compose an email and send it to friends and acquaintances in the victim's list with the content it wants to share with you a document file. there. The trick may not seem too new, but the thing is that this virus will ask you to log in to your Google account, then the familiar Google OAuth authentication website will appear with a request for a password. access and force the user to agree to continue.

Google can't help but see it as a tool to spread viruses

Google Docs becomes an effective tool for hackers, Google can't sit and watch
Real and fake email illustrations

This virus is considered dangerous and sophisticated not only in that it comes from the address of someone you know. But also because it can accurately use every word of a standard email, even the biggest trap (the Open button ) is perfectly designed and lifelike, making users no matter how observant. also hard to detect.

Google Docs becomes an effective tool for hackers, Google can't sit and watch

In addition, as soon as you click the Open button to confirm the file share, the victim will be taken to a website that grants OAuth access (also from Google). The interface, the presentation, the words, the avatar... everything is so perfect it's unbelievable. Make no one doubt.

Google Docs becomes an effective tool for hackers, Google can't sit and watch

The only way to detect this is a phishing tool is to left-click on the downward arrow icon in the section Google Docs would like to , because it will now show you some information related to the source of this site, and that could be anything, except Google.

Google Docs becomes an effective tool for hackers, Google can't sit and watch
The only way to recognize the virus but almost no one knows and pays attention to this feature

As the images in the article, we can see that it is an email address named [email protected] .

Google Docs becomes an effective tool for hackers, Google can't sit and watch

This can be considered a major security flaw of Google, because its applications and software always use the Google OAuth authentication page, so it is very easy for bad guys to take advantage of attacks. However, there is an easy way to find out, that the development source of this page always has the extension @google.com .

At the same time, instead of directing the victim to a Google website, the virus will try to direct the victim to a fake website with a similar interface ( googledoc.g-docs.pro ).

Google Docs becomes an effective tool for hackers, Google can't sit and watch
Google still can't solve this problem for users

Another problem that Google also needs to consider, is that companies have limited control over the virus attached to Google's infrastructure. Instead of taking control, they will direct the user to an error page and turn off the authentication request from OAuth. Although Google took steps to prevent it, with the short time it took to spread, the Google Docs virus got everything it needed from its victims.

Preventing Viruses Google Docs

Currently, Google has only announced that they have removed the offending accounts and fake websites, without mentioning the prevention or remedy for the victims, the only way that users still have to rely on, is to be vigilant. and do some simple methods below:

  • Do not click on suspicious links, even if the sender of the email is your lover or boss.
  • Enable two- factor authentication.
  • Change your email account password and all other services. Then set up a really strong password with a combination of numbers, lowercase and uppercase characters.
  • Disable access to your account. When you realize you've accidentally clicked on a link sent by a virus, immediately revoke the access granted to Google Docs by going to your Google account management homepage , then searching Google Docs and Remove the permissions that I have granted to this tool before.

Google Docs becomes an effective tool for hackers, Google can't sit and watch

  • Another way that you can also apply, is right in the interface of your Gmail account, report fake email, email that you suspect to contain that virus to Google.

Google Docs becomes an effective tool for hackers, Google can't sit and watch

Until Google or security companies find a way to completely fix this problem, you should be careful what you suspect and try to be careful with every click of your mouse.

How to avoid Plagiarism using online rewriting tools

How to avoid Plagiarism using online rewriting tools

Plagiarism is one of the most severe problems we face in this Internet age. Because there is so much data available on the Internet, stealing someone elses strategic work and claiming it as your own is a common practice these days.

Applying Workplace (Facebook) to effective online teaching

Applying Workplace (Facebook) to effective online teaching

Workplace Facebook is used as a tool to support online teaching. Combining Workplace Facebook with online teaching software will bring flexibility when organizing online teaching. Here's a look at the features and how to use Workplace Facebook in detail.

Instructions on how to prepare E-Learning lessons using iSpring Suite software

Instructions on how to prepare E-Learning lessons using iSpring Suite software

How can teachers prepare E-learning lessons using iSpring Suite software? The following article will introduce and guide you to use iSpring software from A - Z

Zoom Meetings software for free online learning - Instructions for using Zoom classrooms

Zoom Meetings software for free online learning - Instructions for using Zoom classrooms

Zoom Meetings has a free version for those who want to experience it first or can't afford to buy packages. However, downloading Zoom for free online learning will be limited to a maximum of 100 participants.

Instructions on how to use Microsoft Teams to teach and work effectively

Instructions on how to use Microsoft Teams to teach and work effectively

Microsoft Teams is your online chat, meeting, calling, and collaboration app, no matter where you are. Microsoft Teams is one of the online teaching software used to teach and work online to help your team maintain remote work and improve work efficiency.

Step-by-step instructions for using Zoom Meeting to teach online for teachers and students

Step-by-step instructions for using Zoom Meeting to teach online for teachers and students

Zoom Meeting is one of the best free online teaching software in 2020. You can create different classrooms and invite unlimited participants.

Google Docs becomes an effective tool for hackers, Google cant sit and watch

Google Docs becomes an effective tool for hackers, Google cant sit and watch

Google Docs became an effective tool for hackers, Google couldn't sit and watch, Not long ago, a new computer virus appeared and attacked users.

7 Types of Malware Attacks and How to Prevent Them

7 Types of Malware Attacks and How to Prevent Them

They are advantages and disadvantages with the advent of technology being used in almost every angle of day-to-day lives. Technology has brought in a lot of ease in our operations at home, our offices, and businesses as well.

Learn PowerPoint - Lesson 4: Basic text instructions

Learn PowerPoint - Lesson 4: Basic text instructions

Learn PowerPoint - Lesson 4: Basic Text Instructions, If you're new to PowerPoint, you need to learn how to handle text. This lesson will teach you how to cut, copy,

Instructions for registering and using Webex Meeting on mobile

Instructions for registering and using Webex Meeting on mobile

Instructions for registering and using Webex Meeting on mobile, Step-by-step instructions on how to register, create a room and enter a room on the Webex Meeting application on Android and iOS.

Learn PowerPoint - Lesson 25: Check and protect presentation files on Microsoft PowerPoint

Learn PowerPoint - Lesson 25: Check and protect presentation files on Microsoft PowerPoint

Learn PowerPoint - Lesson 25: Check and protect presentation files on Microsoft PowerPoint, PowerPoint allows you to check and protect presentations. Here are

Instructions for listing files into Excel files

Instructions for listing files into Excel files

Instructions for listing files into Excel files, Instructions for listing files and files in a folder into Excel spreadsheets with a browser and CMD.

Schedule meetings, learn online in Webex Meetings

Schedule meetings, learn online in Webex Meetings

Schedule a meeting, learn online in Webex Meetings, How to schedule a meeting in Webex Meetings is fast and easy. Here is a guide to scheduling meetings and learning online

Learn PowerPoint - Lesson 5: How to use themes for PowerPoint slides slide

Learn PowerPoint - Lesson 5: How to use themes for PowerPoint slides slide

Learn PowerPoint - Lesson 5: How to use a theme for PowerPoint slides, PowerPoint Theme is a combination of predefined colors, fonts and effects. Let's join WebTech360

How to delete all messages in Gmail

How to delete all messages in Gmail

How to delete all messages in Gmail, Gmail by Google is the most popular and popular email service in the world. In the following article, WebTech360 will guide the

Learn PowerPoint - Lesson 21: How to use charts in PowerPoint

Learn PowerPoint - Lesson 21: How to use charts in PowerPoint

Learn PowerPoint - Lesson 21: How to use charts in PowerPoint, Do you know how to draw charts in PowerPoint? Let's learn everything with WebTech360

Instructions for installing fonts on Mac

Instructions for installing fonts on Mac

Instructions for installing fonts on Mac, Join WebTech360 to learn how to install fonts on Mac OS quickly and simply through the following article.

Learn PowerPoint - Lesson 11: How to create a list in Microsoft PowerPoint

Learn PowerPoint - Lesson 11: How to create a list in Microsoft PowerPoint

Learn PowerPoint - Lesson 11: How to create a list in Microsoft PowerPoint, Formatting PowerPoint content as a bulleted or numbered list will help the audience easily

Learn PowerPoint - Lesson 13: How to insert pictures into PowerPoint

Learn PowerPoint - Lesson 13: How to insert pictures into PowerPoint

Learn PowerPoint - Lesson 13: How to insert pictures into PowerPoint, Adding pictures can make your presentation more interesting and attractive. Here's everything you need

Create professional mind maps with Edraw Mind Map

Create professional mind maps with Edraw Mind Map

Make a professional mind map with Edraw Mind Map, Instructions to install and use the software to create Edraw Mind Map extremely professional and simple.