Home » Technology » IT attacks on gmail accounts. How users can be protected

IT attacks on gmail accounts. How users can be protected

Although Google accounts benefit from strong authentication methods, such as Multifactor (MFA) authentication, attackers have exploited a breach of so-called application passwords – a system designed for older devices that do not support two steps.

How does the attack work?

Table of Contents

Application passwords are 16 characters unique codes, created to allow access to Google accounts from older applications or devices that cannot manage two -factors authentication.

Unfortunately, just the lack of that second step – the verification code – makes these passwords more vulnerable to phishing attacks.

According to Malwarebytes, hackers Russians used this method to deceive academics and critics of the Russian regime. Under the pretext of invitations from the US State Department, the victims were convinced to generate and send passwords, without allowing total access to their Google accounts.

Read and Google warning. Why do you have to change the Gmail password

Who is in danger?

Although these attacks have been extremely targeted, experts warn that now, once the method is known, the general public could become targeted in future campaigns social engineering.

“We can expect this technique to be reused in other attacks, this time against ordinary users,” Malwarebytes warns.

How can you protect yourself? 6 essential security rules

Cyber ​​security specialists recommend a number of simple but essential steps to reduce the risks:

  1. Use application passwords only when absolutely necessary. If you can, go to devices and applications compatible with safer authentication methods.

  2. Choose advanced MFA methods. Authentificators such as Google Authenticator or physical security keys (eg FIDO2) are safer than SMS codes or application passwords.

  3. Learn to recognize phishing attempts. Continuous education is vital – attackers are based on users’ naivety to sow MFA.

  4. Updates the operating system and applications. Activates automatic updates to eliminate known vulnerabilities.

  5. Monitors the activity of the account. Pay attention to unusual logs or from unknown locations and restrict access when possible.

  6. Uses high -performance antivirus software. Modern security solutions can block dangerous areas and detect cheating attempts.

Although Google platforms offer high security standards, no system is completely immune. Users must remain vigilant, avoid using application passwords, and adopting more modern authentication methods, according to Mirror.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.