Connect with our team of offensive security, AI security and pen testing experts at Black Hat Europe 2023. Learn More

Connect with our team of offensive security, AI security and pen testing experts at Black Hat Europe 2023. Learn More

Managed Detection & Response

Eradicate cyberthreats with world-class intel and expertise

Managed Security Services

Expand your team’s capabilities and strengthen your security posture

Consulting & Professional Services

Tap into our global team of tenured cybersecurity specialists

Penetration Testing

Subscription- or project-based testing, delivered by global experts

Database Security

Get ahead of database risk, protect data and exceed compliance requirements

Email Security & Management

Catch email threats others miss with layered security & maximum control

Co-Managed SOC (SIEM)

Eliminate alert fatigue, focus your SecOps team, stop threats fast, and reduce cyber risk

Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
The Trustwave Approach
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Platform
SpiderLabs Fusion Center
Security Operations Centers
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

What to Do When You‘re Getting Phished but Have No Idea Because It Looks Totally Authentic

A "huge, startlingly fast-moving, and perplexing" phishing attack made its way to an estimated one million-plus Gmail users on Wednesday.

The scam, which spread via legitimate-looking invites that came from a trusted contact asking the potential victim to view a Google Docs file, quickly became the talk of the cyber world after it appeared to first target media organizations and then spread like wildfire soon after.

"[W]hen you click on the [invite] link to open the file, you are directed to grant access to an app that looks like Google Docs but is actually a program that sends spam emails to everyone you've emailed," according to a Recode story, which cited a thread on Reddit.

@zeynep Just got this as well. Super sophisticated.

— Zach Latta (@zachlatta) May 3, 2017

Google quickly fixed the issue, which did not relate to a vulnerability on its end, by removing the bogus pages and applications involved in the attack. Adding to the intrigue is that an ethical hacking student at U.K.-based Coventry University is now claiming the whole incident was an accident and was merely meant as a test for a final project he was working on - although there is rightful skepticism abound.

Google on Wednesday night suggested fewer than 0.1 percent of its Gmail user base was affected, although our own (admittedly unscientific and short-sampled) Twitter poll found that 39 percent of respondents received or know someone who received the phishing message. Did you? Please vote.

But beyond the attack itself, it is worth reminding you that phishing messages only seem to be getting savvier and more authentic-looking, fooling even seasoned experts. Gone are the days when obvious misspellings and grammatical errors provide a dead giveaway that shenanigans are at play.

I asked Trustwave VP of Security Research Ziv Mador whether organizations should just wave the white flag of surrender - or if there are still steps they can take to keep phishing at bay.

"Some attacks are so well crafted that while we can provide some tips, they are so slight that you really can't blame the victim anymore for doing something unreasonable," Ziv told me. "The Grand Mars operation is another good example."

(That op, by the way, uses phone calls to add legitimacy).

Nobody wants to go through life thinking everyone is out to get them, but practicing extreme cautiousness on the web these days still can pay dividends. Ziv suggested that you:


1). Think Before You Click

"Don't rush to click links even if they seem legit and sent by someone you know. If you did not expect them, check with your contact first to see if they intended to send it. Remember, once your machine is infected, the malware may send emails on your behalf."


2). Dig Deeper

"If you have doubts about an email or invite - such as the tactic used with Google Docs - first check the developer information or any other information about the application or website involved. If the information there doesn't seem right, don't continue (e.g. do not grant permissions)."


3). Turn to Technology and Teaching

"For businesses especially, deploy a secure web gateway, which leverages sophisticated logic to detect web-based attacks. Also, continually educate your employees on how to identify phishing attacks, especially the ones that are so good, you just can't believe they are malicious."

Latest Trustwave Blogs

The Two Sides of ChatGPT: Helping MDR Detect Blind Spots While Bolstering the Phishing Threat

ChatGPT is proving to be something of a double-edged sword when it comes to cybersecurity.

Read More

Trustwave MailMarshal Email Security Protects Against WinRAR Vulnerability CVE-2023-38831

The importance of email security cannot be understated. Proof of this can be seen in some recent research conducted by the Trustwave SpiderLabs team around our email security product MailMarshal.

Read More

Bah, Humbug! Grinchbots and Freebie Bots Attempt to Ruin Holiday Shopping for Consumers and Retailers

If the holiday classic “How the Grinch Stole Christmas” was remade in 2023, the mean green guy might be played by an Internet bot.

Read More