Case Studies Included

The 2016 Google Docs Phishing Attack

Attack Methodology:

The attackers used an email that seemed to come from a trusted source, inviting users to collaborate on a Google Document. The link redirected users to a fake Google login page that closely mimicked the legitimate one. Upon entering their credentials, users unknowingly provided their login information to the attackers.

Technical Details:

The phishing emails were crafted using social engineering techniques to exploit trust. Attackers utilized OAuth 2.0 to create a legitimate-looking request for access, which made the scam more convincing.

Impact and Response:

Google quickly responded by suspending the malicious accounts and enhancing their phishing detection algorithms. Users were educated on recognizing suspicious links and the importance of verifying the sender’s email address.

Back to Module 1