status.invoicenotices.com Open in urlscan Pro
100.24.100.138  Public Scan

URL: http://status.invoicenotices.com/status_changes/booking_id/040852.aspx/65bd76/0f9c494b-295b-4338-8427-36541e3263cd/
Submission: On September 02 via manual from US

Form analysis 0 forms found in the DOM

Text Content

Skip to Main Content
EnglishEnglish
 * DeutschGerman
 * EnglishEnglish
 * Español [EU]Spanish [EU]
 * Français [EU]French
 * ItalianoItalian
 * NederlandsDutch
 * PolskiPolish
 * Português [BR]Portuguese [BR]
 * TürkçeTurkish
 * РусскийRussian
 * العربيةArabic
 * 日本語Japanese
 * 简体中文Chinese Simplified
 * 繁體中文Chinese Traditional

No results found


THIS WAS AN AUTHORIZED PHISHING SIMULATION


WHAT YOU NEED TO KNOW ABOUT GOOGLE PHISHING SCAMS

Cybercriminals frequently impersonate trusted brands like Google. They use
Google logos, signatures, email addresses, and brand colors to make phishing
emails look legitimate.

Popular phishing email topics:

 * Account security alert
 * New Gmail messages
 * Promotion for using Google services
 * Secure file via Google Drive
 * Shared Google Docs file
 * Verify account
 * Update password

How do you know if an email is suspicious? Check out these real phishing emails
to learn the warning signs of a phish.

 * Shared File
 * Unusual Login

 

From: Gale <Beauchamp@gmail.com>

Subject: Pamela Kern has shared a document with you

Pamela Kern has invited you to view the following document:

Open Doc

Hover over the indicators in red to learn the indicators of a phish.Click on the
indicators in red to learn the indicators of a phish.

Cybercriminals leverage the popularity of Google in credential phishing scams.
If you click to view the “shared file”, you are taken to a fake Google login
page designed to steal credentials.

Another popular tactic is to hide malware in Google Drive files to bypass secure
email gateways.


REMEMBER:

 1. Never download unsolicited files. Do not download any file attached to email
    or sent via hyperlink unless you know the sender and were expecting the
    attachment.
 2. Verify with the sender. Phishing emails often use brands and images you
    recognize to create a sense of trust. If you know the sender, reach out to
    verify the email is legitimate.
 3. Inspect the URL if you did happen to click. Does this belong to your
    organization? Cybercriminals can compromise or create a Google site to
    ultimately steal your credentials.

 

From: Google e-mail Support <support@google.com>

Subject: Google Protection Request For : Multiply Attempt On Your Account


NEW DEVICE SIGNED IN TO

Redacted@financialservices.com

--------------------------------------------------------------------------------

Your e-mail Account was just signed in to from a new Windows device.
You're getting this email to make sure it was you.

Check activity

You received this email to let you know about important changes to your Google
Account and services.
© 2021 Google LLC, 1600 Amphitheatre Parkway, Mountain View, CA 94043, USA

Hover over the indicators in red to learn the indicators of a phish.Click on the
indicators in red to learn the indicators of a phish.

Cybercriminals often appeal to emotions of fear and urgency with email
narratives like “Unusual Login Attempt” or “Account Shutdown”. Use caution if
you receive an urgent email about account status or unusual activity.

Inspect the URL to ensure the site belongs to your organization before logging
in.


REMEMBER:

 1. Keep your passwords private. Strengthen the security of your account by
    setting up Multi-Factor Authentication (MFA) whenever it is offered. MFA is
    an added layer of security. After entering your password, you must use a
    second method like using a thumbprint or entering a unique code sent to your
    mobile device to verify your identity.
 2. Check your account activity by visiting the Recent Security Events page for
    your Google account. On that page, you can check your sign-in history,
    including the dates and times that your Gmail account was used. You can also
    see the IP addresses which were used to access your account.
    
    Use bookmarks or type the URL in your browser instead of clicking an email
    link.

Learn about Office Files with Macros
 
Report Phishing

Remember, you are the last line of defense against phishing. If you receive a
suspicious email, report it immediately.

Disclaimer

All third-party trademarks referenced by Cofense whether in logo form, name form
or product for, or otherwise, remain the property of their respective holders,
and use of these trademarks in no way indicates any relationship between Cofense
and the holders of the trademarks. Any observations contained in this blog
regarding circumvention of end point protections are based on observations at a
point in time based on a specific set of system configurations. Subsequent
updates or different configurations may be effective at stopping these or
similar threats.
The Cofense® and PhishMe® names and logos, as well as any other Cofense product
or service names or logos displayed on this blog are registered trademarks or
trademarks of Cofense Inc.

©Cofense

Google Phishing Scams