Sneaky Gmail phishing attack fools with fake Google Docs app

Russian hackers resorted to a similar method to abuse the OAuth protocol to phish user accounts

Google Docs was pulled into a sneaky email phishing attack on Tuesday that was designed to trick users into giving up access to their Gmail accounts.

The phishing emails, which circulated for about three hours before Google stopped them, invited the recipient to open what appeared to be a Google Doc. The teaser was a blue box that said, “Open in Docs.”

In reality, the link led to a dummy app that asked users for permission to access their Gmail account.

screen shot 2017 05 03 at 2.38.57 pm Reddit

An example of the phishing email that circulated on Tuesday.

Users might easily have been fooled, because the dummy app was actually named “Google Docs.” It also asked for access to Gmail through Google’s actual login service.

The hackers were able to pull off the attack by abusing the OAuth protocol, a way for internet accounts at Google, Twitter, Facebook and other services to connect with third-party apps.  

The OAuth protocol doesn’t transfer any password information, but instead uses special access tokens that can open account access.

However, OAuth can be dangerous in the wrong hands. The hackers behind Tuesday’s attack appear to have built an actual third-party app that leveraged Google processes to gain account access.

screen shot 2017 05 03 at 2.40.58 pm Reddit

The dummy app will try to ask for account permission. 

“The attack is quite clever and it exploits the ability for you to link your Google Account to a third-party application,” said Mark Nunnikhoven, vice president of cloud research at security firm Trend Micro.

Exploiting OAuth for account access is particularly devious because it can bypass the need to steal someone's login credentials or even Google's 2-step verification.

Last month, Trend Micro said a Russian hacking group known as Fancy Bear was using a similar email attack method that abused the OAuth protocol to phish victims.

However, security experts said Tuesday's phishing attack probably wasn't from Fancy Bear, a shadowy group that many experts suspect works for the Russian government.

"I don't believe they are behind this ... because this is way too widespread," Jaime Blasco, chief scientist at security provider AlienVault, said in an email. 

On Tuesday, many users on Twitter, including journalists, posted screen shots of the phishing emails, prompting speculation that the hackers were harvesting victims' contact lists to target more users.

The attack was also sent through an email address at "" Mailinator, a provider of a free email service, denied any involvement. 

Fortunately, Google moved quickly to stop the phishing attacks, after a user on Reddit posted about them.

“We’ve removed the fake pages, pushed updates through Safe Browsing, and our abuse team is working to prevent this kind of spoofing from happening again,” Google said in a statement.

Security experts and Google recommend affected users check what third-party apps have permission to access their account and revoke any suspicious access. Users can do so by visiting this address, or performing a Google security check-up.

It's also good practice to be careful around suspicious-looking emails. Many hacking attempts, including malware infections, come through links or attachments sent over email.

Security firms are warning that other hackers may conduct similar phishing attacks abusing OAuth, not just through Google, but with Facebook and LinkedIn. 

"Like all other creative, novel approaches, it will likely be heavily copied almost immediately," Cisco's Talos security group said in a blog post. Talos has identified more than 275,000 applications that use OAuth and connect to the cloud. 

But even though Tuesday's attack may have been novel, the dangers with OAuth are hardly new. Security experts have warned in the past that users may be phished through manipulation of OAuth to grant permissions to the wrong party.

In response to such attacks, Google said last month that it reviews any OAuth abuse and takes down thousands of apps that violate its user data policy, including those that impersonate company products.

Tuesday's phishing scheme will probably push Google to adopt an even stricter stance on apps that use OAuth, said Robert Graham, CEO of research company Errata Security.

However, the internet giant has to strike a balance between ensuring security and fostering a flourishing app ecosystem. 

"The more vetting you do, the more you stop innovation," Graham said. "It's a trade-off."

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Michael Kan

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?