SpinOne All-in-One SaaS Security Platform
Protect mission critical SaaS data with SpinOne
See SpinOne in Action
Taking Control of SaaS Security with Chrome Enterprise and SpinOne
Spin.AI Partner Program
Alexa Villanueva
Director of Marketing
Walk through a gmail-specific attack scenario. Learn the indicators of compromise, automated containment, and safe restore workflows enabled by SpinOne.
Transcription
In this video, we take a look at how Gmail™ can be exposed to a ransomware attack.
In the hacker’s dashboard, he inputs the target’s email.
The email is received by the target.
It’s from his security team, with the subject important notice.
The email looks legitimate, promoting a new anti spam pro application endorsed by his security team.
So he proceeds to click to secure his account.
It takes him to a very common sign screen for Google.
This request permissions to read, compose, send and permanently delete all your email from Gmail™.
He proceeds to click allow.
Once done, the hacker has complete control of the target’s emails.
At this point, the hacker can use this information to embarrass a target, ruin his credibility by leaking the emails.
But in this case, he proceeds to start a ransomware attack.
A refresh shows that within seconds, the emails are encrypted.
Soon, another emails received from the security team with a different kind of message.
This one says, if you want your data back, you’ll need to send the payment.
For more information, or to learn how SpinOne could stop this ransomware attack, please visit Spin.AI.
Forbes 500 America’s Best Startup Employers 2025
Strong Performer, Forrester Wave SSPM report
Representative Vendor, Backup as a Service
Strong Performer, GigaOm SSPM Radar Report
3x Global infoSec Award Winner, Cyber Defense magazine
Schedule a 30-minute personalized demo with one of our security engineers.