Security specialists have found another phishing strategy that is targeting Gmail clients. The trap is undetectable to the point that even the most professional individuals get tricked and reveals their Google login credentials.The hackers first get into particular Gmail account and once there, they start the subsequent attacks.Here is how the phishing scam works. You will notice an email from a person who is already infected by this attack. The email will be from a person who is there in your contacts.It may look like as if there is some attachment associated with the email. It might be an image which resembles like an attachment. Once the image is clicked a fake google sign in page will pop out and when the details are given the account will be infected. The hacker first scan for any emails the victim may have sent with an attachment and subject to any of their contacts. The hackers from that point use the victim's contact to send more emails to get new login details. The messages look like it comes from somebody you know and that makes the victim click on it.
The phishing technique utilizes pictures that are intended to look like pdf documents. Once the victim goes through that, it prompts a login page where the victim drops their credentials. The fake URL utilized is likewise difficult to spot as it looks authentic like the one you use. What's more, the browser does not demonstrate the red cautioning symbol that Google uses to show that a page is secure. Security experts tell the Gmail users to use two-factor authentication which ensures extra protection. With a two-factor verification framework, the attacker should have access to your telephone or USB key to get into your account. The experts warn the users to be cautious while signing in to any service. It is a good approach to verify the browser location bar, protocol, and the host name before signing in.Normally when you sign in to Gmail or Google In chrome, URL looks like below.
The green color and the lock symbol in the URL shows that the site is secure.