Master SaaS Data Protection with Insights from Former Gartner Analyst Nik Simpson Watch the Webinar
Home » Spin.AI Blog » Google Workspace Ransomware Protection » Ransomware Attack Example in Google Workspace and Office 365

Ransomware Attack Example in Google Workspace and Office 365

November 12, 2021 | Updated on: February 3, 2025 | Reading time 7 minutes
Author:
Avatar photo

Vice President of Product

No matter if you are a business owner or work in any other sector like healthcare, education, or finance – in 2021, ransomware is officially after your cloud data. This new, more malicious type of ransomware is called ransomware 2.0. Watch ransomware attack example videos for Google Workspace and Microsoft Office 365. Learn how to protect against this type of malware.

So, how do your files in the cloud get compromised during the ransomware attack?

Ransomware Attack Example

The first and more traditional way is through the file synching application: ransomware infects the device that runs a synch program, so the synched files in the cloud get encrypted as well.

The new type of ransomware can infect your cloud data straight in the cloud, bypassing all the desktop antiviruses and often aiming straight to your cloud storage. There, it encrypts emails, documents, calendars, and contacts, depending on the type and purpose of the ransomware.

Let’s take a look at how you can get emails compromised by the cloud ransomware attack:

The Sequencing of The Cloud Computing Attack

1. A user gets a phishing email

Even though it seems harmless, there are still signs by which you can understand it is a scam:

  1. Screaming title
  2. Urge to click
  3. Big button with a call to action

In the video, the user proceeds to the site by pressing the button.

ransomware attack example

2. A user provides requested permissions

This is the most critical step. When you provide a site or an application with the permissions it requested, they get to insert malicious code in whatever you gave access to. In the case in the video, hackers had three opportunities: delete emails, encrypt them, or steal information.

3. Emails in the cloud are encrypted

As you can see in the video, it takes a few seconds to encrypt a whole mailbox. The same is fair for any type of data in the cloud: documents, calendars, contacts, sites, presentations, etc. And when those are shared and are a necessity for the whole department, it becomes a huge problem for companies and institutions.

Moreover, this type of ransomware is able to infect cloud backup as well. This is what makes this ransomware 2.0 one of the biggest cloud threats of 2020.

Ransomware Attack Examples in Google Workspace and Microsoft Office 365

1. Google Workspace:

2. Office 365:

See more videos about ransomware on our YouTube Channel.

How to protect your data from cloud ransomware attacks

New threats require new solutions; you can’t beat this type of ransomware with antivirus and backup only. That is why we’ve created SpinOne – a cybersecurity platform that is designed to detect and block all the new cloud cyber threats.

SpinOne provides you with the necessary arsenal of tools to keep your cloud data safe and sound:

  1. SpinBackup – a secure backup service 3x a day with fast selective data recovery;
  2. SpinRDR – ransomware protection that monitors your cloud data 24/7 and detects and stops ransomware attacks.
  3. SpinSPM – AI-based security monitoring of all connected applications, brute-force attacks, and sensitive information sharing.

Want to see how it works?

Try SpinOne for Free

Share this article

Was this helpful?

0/400
Thanks for your feedback!
Avatar photo

Written by

Vice President of Product at Spin.AI

Davit Asatryan is the Vice President of Product at Spin.AI

He is responsible for executing product strategy by overseeing the entire product lifecycle, with a focus on developing cutting-edge solutions to address the evolving landscape of cybersecurity threats.

He has been with the company for over 5 years and specializes in SaaS Security, helping organizations battle Shadow IT, ransomware, and data leak issues.

Prior to joining Spin.AI, Davit gained experience by working in fintech startups and also received his Bachelor’s degree from UC Berkeley. In his spare time, Davit enjoys traveling, playing soccer and tennis with his friends, and watching sports of any kind.


Featured Work:
Webinar:

Latest blog posts

Everything You Need to Know about Google Drive Ransomware Recovery

Everything You Need to Know about Google Drive Ransomware Recovery

Article Summary:  Ransomware is a major threat to businesses, and Google Drive is not immune....

Avatar photo

Vice President of Product

Read more
Ransomware Protection for MSPs: How to Keep Your Business and Clients Protected

Ransomware Protection for MSPs: How to Keep Your Business and Clien...

MSP and Ransomware Protection Summary MSPs are prime ransomware targets due to their access to...

Avatar photo

Vice President of Product

Read more
Cyberhaven: Latest Research Reveals 8 Additional Compromised Extensions Affecting 1.1 Million Users

Cyberhaven: Latest Research Reveals 8 Additional Compromised Extens...

Spin.AI’s latest research has uncovered 8 additional compromised browser extensions, used by 1.1 million users...

Avatar photo

Product Manager

Read more