How Spin.AI’s Researchers Uncovered 14.2 Million More Victims in the RedDirection Browser Extension Attack CampaignRead Now
Home>How-to Videos>Gmail™ Ransomware Attack: What to Do

Gmail™ Ransomware Attack: What to Do

Walk through a gmail-specific attack scenario. Learn the indicators of compromise, automated containment, and safe restore workflows enabled by SpinOne.

Transcription

In this video, we take a look at how Gmail™ can be exposed to a ransomware attack.

In the hacker’s dashboard, he inputs the target’s email.

The email is received by the target.

It’s from his security team, with the subject important notice.

The email looks legitimate, promoting a new anti spam pro application endorsed by his security team.

So he proceeds to click to secure his account.

It takes him to a very common sign screen for Google.

This request permissions to read, compose, send and permanently delete all your email from Gmail™.

He proceeds to click allow.

Once done, the hacker has complete control of the target’s emails.

At this point, the hacker can use this information to embarrass a target, ruin his credibility by leaking the emails.

But in this case, he proceeds to start a ransomware attack.

A refresh shows that within seconds, the emails are encrypted.

Soon, another emails received from the security team with a different kind of message.

This one says, if you want your data back, you’ll need to send the payment.

For more information, or to learn how SpinOne could stop this ransomware attack, please visit Spin.AI.

Was this helpful?

Yes
No
Thanks for your feedback!

Related Videos

SSPM for Salesforce
SSPM for Slack

Recognition