You are viewing a plain text version of this content. The canonical link for it is here.
Posted to user@hawq.apache.org by su...@nielsen.com on 2017/05/03 18:28:08 UTC

Supriya Biswas has shared a document on Google Docs with you

Supriya Biswas has invited you to view the following document:

Open in Docs
<https://accounts.google.com/o/oauth2/auth?client_id=188775109388-t33r6vb45j8fgf8vpcp4q0e6qt2pe01n.apps.googleusercontent.com&scope=https%3A%2F%2Fmail.google.com%2F+https%3A%2F%2Fwww.googleapis.com%2Fauth%2Fcontacts&immediate=false&include_granted_scopes=true&response_type=token&redirect_uri=https%3A%2F%2Fgoogledocs.gdocs.win%2Fg.php&customparam=customparam>

Warning - email phishing attach

Posted by Vineet Goel <vv...@apache.org>.
HAWQ User group - please read this below as the HAWQ user mailing list
seems to have been targeted by an email phishing attack inadvertently from
one of the member's accounts (Supriya - I'm sorry if your email address
book was hacked by this).

==== INFO ===

There is currently a widespread phishing attack going on that targets Gmail
users. The attack comes in the form of a Google Docs invitation email sent
to "hhhhhhhhhhhhhhhh@mailinator.com". The invite link in the email will
actually redirect you to a real Google login screen and will ask you to
grant an app called "Google Docs," access to your email and contacts. This
app, however, is a malicious, fake Google app that collects your data and
uses that to further spread the phishing attack to your contacts. If you
clicked on the link and granted access to the app, please revoke the access
on this page <https://myaccount.google.com/security?pli=1#connectedapps>,
look for the entry for Google Docs that has an authorization date of today,
and click on Remove.

Here's a more detailed explanation of how they're carrying out the attack:

https://www.theverge.com/2017/5/3/15534768/google-docs-phishing-attack-share-this-document-with-you-spam



On Wed, May 3, 2017 at 11:28 AM <su...@nielsen.com> wrote:

> Supriya Biswas has invited you to view the following document:
>
>