There have been multiple sightings of a variation on the "View a Google Doc" phishing email, this one with the subject line "View project document!" Do NOT do so. Instead, if you haven't already deleted it, mark it as phishing.
Below is an example of this email. Note that like similar ones, the TO field is blank. It unfortunately looks like it can be real because it comes from a Brown address, which has probably been compromised. Read more about phishing http://www.brown.edu/go/phishing.
Symantec has reported a "sophisticated scam" targeting Google Docs and Google Drive users. Like similar ones already reported at Brown, the phishing email urges the receiver to click on a link to view an important Google Doc.
What to look out for: The link doesn't go to Google Docs, but redirects you to a log-in screen that doesn't recognize you as a Google user, asking you to login again. If this seems strange, it is and a big clue that this is fake and to go no further.
Google's response when alerted about this: "We've removed the fake pages and our abuse team is working to prevent this kind of spoofing from happening again. If you think you may have accidentally given out your account information, please reset your password."
Security & Google
Gmail security checklist: https://support.google.com/mail/checklist/2986618?rd=1
Compromised Gmail account: https://support.google.com/mail/answer/50270?hl=en
Using two-factor authentication: http://www.google.com/landing/2step/
Be on the lookout for the latest phishing scam, supposedly sent from Blackboard (sender is notify @ blackboard.com) and attempts to get you to click on the link provided. DO NOT click on it. Instead, alert Gmail to this phish (use the Report Phishing option) or simply delete it.
Continued reports of the latest phishing attempt that surfaced last week, asking you to view an attached document. Do NOT do so. Instead, if you haven't already deleted it, mark it as phishing.
Below is an example of this email. Note that like similar ones, the TO field is blank. It unfortnately looks like it can be real because it comes from a Brown address, which has probably been compromised. Read more about phishing at http://www.brown.edu/go/phishing.
Date: Thu, Feb 27, 2014 at 11:29 PM
Subject: New Project Proposal!
Kindly, review the Project proposal document attached using Google drive and get back to me, your urgent attention is needed.
A phishing email from "IT Service Desk" has been making the rounds today. It asks you to click on a link to "Validate your account." Do NOT do so. Instead, if you haven't already deleted it, mark it as phishing.
Below is an example of this email. Note that like similar ones, the subject is blank, it has grammar errors, and contains the threat that "You will not be able to receive new mails until you Re-Validate your Email Account." Read more about phishing at http://www.brown.edu/go/phishing.
Patches are now available for the security flaws in iPhone, iPad, AND OSX devices. Last Friday Apple released iOS 7.0.6 to address a security flaw and provided these details on that fix:
iOS 7.0.6 | Data Security | CVE-2014-1266
Available for: iPhone 4 and later, iPod touch (5th generation), iPad 2 and later
Impact: An attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS
Description: Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps.
Since this flaw is easily exploitable, ISG recommends that you upgrade to 7.0.6 as soon as you can. It is an unfortunate reminder that Apple products can be vulnerable and its users need to stay current with all security patches.
The same flaw existed in desktop and laptop computers powered by its OS X operating system. The OS X Update 10.9.2 is now available, which includes the security fix.
Apple's Security Update page: http://support.apple.com/kb/HT1222
About the security content of iOS 7.0.6: http://support.apple.com/kb/HT6147
About the security content of OS X Mavericks v10.9.2 and Security Update 2014-001: http://support.apple.com/kb/HT6150
SANS Internet Storm Center: https://isc.sans.edu/forums/diary/IOS+SSL+vulnerability+also+present+in+OS+X/17702
Brian Krebs blog post: http://krebsonsecurity.com/2014/02/ios-update-quashes-dangerous-ssl-bug/
First reported in December, the Googledoc phishing scam persists with a variety of subject lines (IMPORTANT DOCUMENT and ... Sent You a Google Doc are two examples). Many are from Brown addresses (accounts that have been compromised). Do NOT click on the link. If you have not already deleted it, mark the email as phishing and then delete it. Below are screenshots of two examples.
The phishing scam, subject line "INCOMING FAX REPORT" has resurfaced at Brown. An example follows. As with similar emails, DO NOT CLICK on the link. If you receive one, either delete it immediately or report it as phishing then delete it.
Two phishing scams were reported today, one from a supposed Brown address (firstname.lastname@example.org) and another from compromised Brown accounts. Both contained a link that recipients were told to click. As with others, do NOT click on the link. If you have not already deleted it, mark the email as phishing and then delete it. Examples follow of these latest phishing attempts.
---------- Forwarded message ----------
From: <different Brown addresses>
Date: Thu, Dec 12, 2013 at 5:00 PM
Subject: <Name> Sent You a Google Doc
Google Drive. Keep everything. Share anything
Please check the document i uploaded for you using Google docs. CLICK HERE to sign in securely with your email to view the document its very important.
---------- Forwarded message ----------
From: Brown University <email@example.com>
Date: Thu, Dec 12, 2013 at 7:22 AM
Subject: Message From Brown University
We received a notification fro m our date base system stating your email has been hacked by someone.
You are require to Click Here and log-in to your email in other to validate and secure your email profile.
ISG has received reports of emails from "Brown IT Alert" warning recipients that their brown.edu account was "accessed from a blacklisted IP located in Arizona", listing the details, then requesting they click on a link to "allow the new IP monitoring alert system (to) automatically block the suspicious IP from further future compromise." This is not a legitimate request but a phishing attempt and should be treated as such. Do NOT click on the link. If you have not already deleted it, mark the email as phishing and then delete it.
Note: The address firstname.lastname@example.org has been blocked from being able to send to Brown Gmail addresses.
An example follows:
---------- Forwarded message ----------
From: Brown IT Alert
Date: Wed, Nov 20, 2013 at 11:16 AM
Subject: URGENT: BROWN incident where your NET ID was compromised
Our new IP monitoring alert system that checkmates the increased incidents of phishing attacks and database compromise detected that your "brown.edu" account was accessed from a blacklisted IP located in Arizona. The suspicious login details are shown hereunder:
Access Location: Phoenix, Arizona
IP Address: 126.96.36.199
ISP: Nobis Technology Group, LLC
Host Name: 188.8.131.52.rdns.ubiquity.io
Time of compromise : 10:27 AM, Eastern Standard Time (EST) -0500 UTC
Date of compromise: Wednesday, November 20, 2013
Did you access your account from this location? If this wasn't you, your computer might have been infected by a malicious malware code unnoticed. To protect your account from any further compromise, kindly follow these two steps immediately:
1. Follow this ITS secure link below to reconfirm your login details and allow the new IP monitoring alert system automatically block the suspicious IP (184.108.40.206) from further future compromise
2. Scan your PC immediately to remove all malware codes and any other malignant viruses With these two steps taken, your account will be secured.
Serving you better,
ITS and Database Security