With technology virtually global in the everyday scenario, criminals also need to keep pace with the gradual improvement of systems in order to enable their attacks through sophisticated and accurate concepts.
This is why we report so many scams and new malware that appear vehement and affect all ecosystems, whether they are for PCs or portable devices.
As Android already takes the lead as the most used mobile platform on the planet, categorically Gmail also maintains the most important role in the preference of users, since service understands the very nature of Google’s automated system, which results in the largest base of active users – unfortunately this factor also competes in the constant interest of digital criminals.
After the work that surfaced earlier this year, a new and sophisticated blow discovered this week by experts from Wordfence Security – a company focused on information security. They highlighted the different concept implemented by hackers.
Wordfence points out that the achievement is essentially groundbreaking, despite being based on a relatively old concept. The new action in brief uses a fake email that looks very much like Google’s own standards, including an attachment with a supposed PDF or Word document.
As the user is accustomed to this screen, it clicks on the file in question in order to check what it is, that’s where the damage is done.
In fact an image inherent in the email with a link that directs the user to a page identical to the Gmail login screen, and when the user thinks he has been disconnected from the platform and re-inserts his personal data, all the information is sent to the criminals.
Wordfence experts provide the basic security tips for users to escape from these pitfalls.
The main one is always to check the sender and to be sure that it is a reliable contact, not only by name, but also by the e-mail address itself.
Never click on suspicious links, even if the picture in question appears to be harmless at a first glance.
Pray for your security and never give away your sensitive data on suspicious links that lead to third-party pages.