Google’s Spear Phishing Slip-Up: When “Less Secure Apps” Aren’t Just a Suggestion!

Giles was nearly hooked by a sophisticated spear phishing campaign using app-specific passwords on Google accounts. The Citizen Lab researchers noted the attackers’ patience and adaptability. Google later swooped in to mitigate the attack, reminding users to keep an eye on those pesky, less secure apps.

Pro Dashboard

Hot Take:

When it comes to cybersecurity, you don’t need to be a tech wizard to spot a phishing attempt—you just need to be suspicious enough to ask, “Why does this email smell fishy?” And remember, folks: when an email claims to be from the government and wants your password, it’s probably more of a “take” than a “give.”

Key Points:

  • The attack involved creating an app-specific password (ASP) to access secure government resources.
  • ASP is a workaround for apps that don’t support multi-factor authentication (MFA).
  • The phishing attempt was sophisticated, with attackers adapting their approach based on the victim’s responses.
  • Google has been phasing out support for Less Secure Apps (LSAs) but ASPs can still be created on personal accounts.
  • Google’s mitigation recommendations include avoiding ASPs for high-risk accounts and regularly monitoring account activity.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?