{"id":123937,"date":"2021-06-17T23:23:45","date_gmt":"2021-06-18T06:23:45","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/06\/threat-actors-use-google-docs-to-host-phishing-attacks"},"modified":"2021-06-17T23:23:45","modified_gmt":"2021-06-18T06:23:45","slug":"threat-actors-use-google-docs-to-host-phishing-attacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/06\/threat-actors-use-google-docs-to-host-phishing-attacks","title":{"rendered":"Threat Actors Use Google Docs to Host Phishing Attacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/threat-actors-use-google-docs-to-host-phishing-attacks.jpg\"><\/a><\/p>\n<p>Exploit in the widely used document service leveraged to send malicious links that appear legitimate but actually steal victims credentials.<\/p>\n<p>Threat actors are exploiting Google Docs by hosting their attacks within the web-based document service in a new <a href=\"https:\/\/threatpost.com\/microsoft-google-clouds-hijacked-phishing\/166329\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a> campaign that delivers malicious links aimed at stealing victims\u2019 credentials.<\/p>\n<p>Researchers at email and collaboration security firm Avanan discovered the campaign, which is the first time they said they\u2019ve seen attackers use this type of exploit in Google\u2019s hosted document service, according to a <a href=\"https:\/\/www.avanan.com\/blog\/attackers-take-advantage-of-new-google-doc-exploit?hs_preview=yDruqEUZ-48384993709\" target=\"_blank\" rel=\"noopener\">report published Thursday<\/a> by Jeremy Fuchs, marketing content manager for Avanan.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exploit in the widely used document service leveraged to send malicious links that appear legitimate but actually steal victims credentials. Threat actors are exploiting Google Docs by hosting their attacks within the web-based document service in a new phishing campaign that delivers malicious links aimed at stealing victims\u2019 credentials. Researchers at email and collaboration security [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418],"tags":[],"class_list":["post-123937","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/123937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=123937"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/123937\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=123937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=123937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=123937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}