Skip to main content

Beware of Gmail Phishing Attack

Another day of Email Phishing Attack, this one for Gmail user’s account as the target. Last Tuesday May 3, an email phishing attack that was designed to trick users into giving up access to their Gmail accounts started showing up on target email inbox. The 1st captured image below is an example of Gmail Phishing attack email. When a user click on the “Open in Docs” link, the hacker will exploit the Gmail user’s account.
20170503.Gmail.PhishingAttack1
But it did not stop there, this phishing attack also behave as a “worm” that also sent itself out to all the affected user’s contacts. The 2nd captured image is an example of email coming from @gsa.gov infected user’s contact. You might receive a similar email coming from different email addresses.
20170503.Gmail.PhishingAttack
Please note the recipient email address “[email protected], I hope this is enough reason not to open or read this message, delete it right away. If you clicked on the link and enter your Gmail credentials please continue to read on how to perform Google security check-up.
Here’s how to check your Gmail account.
  • Open a new browser. I highly recommend using a modern browser e.g. Edge, Google Chrome or Firefox because they are equipped with safe browser features to protect and block malicious site or links.
  • Login to your Gmail account. Check your Gmail account connected Apps here (https://myaccount.google.com/u/1/permissions?pli=1). Review and cancel any connection if you don’t need it or don’t know it.
  • Go to Google Security Check-up (https://myaccount.google.com/secureaccount) to check your account.
I hope that help. Have a Safe surfing.
Source: QUE.com

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp