Skip to main content Skip to footer

Police warn public in regards to recent scam involving hidden Google drive

Release Date: July 9, 2021

To help protect you against malicious links, most email clients have filters that flag suspicious-looking emails. To bypass these filters, cybercriminals often create malicious content using well-known platforms such as Google Drive, and then use the platform’s share feature to distribute their content. Since these platforms are so widely used, your built-in email filters typically do not recognize that this content is malicious.

In a recent phishing attack that Kingston Police is aware of and has observed first hand, scammers are using a phony notification from DocuSign (a popular electronic agreement service) that actually includes a link to a malicious Google Doc. The fake notification states that you have an invoice to review and sign. If you click on the included View Document button, you’ll be taken to what appears to be a DocuSign login page that asks for your password. In reality, the button leads you to a Google Doc disguised as a DocuSign page, and any information entered on the document is sent directly to the scammers.

Don’t fall for this trick! Remember:

  • Never click on a link or download an attachment in an email that you were not expecting.
  • If you think the email could be legitimate, be sure to hover over the link (or button) to preview the destination. Look for discrepancies, such as a DocuSign email using a Google Drive link.
  • When an email claims to include an invoice, try to find evidence of the transaction elsewhere, like on your bank or credit card statements.

Stop, look, and think. Don’t be fooled by the scammers.

Contact Us

Kingston Police
705 Division Street
Kingston, Ontario
K7K 4C2

Telephone: 613-549-4660
TTY (hearing impaired): 613-549-8792
Administration Fax: 613-549-3111
Operations Fax: 613-549-7111

This website uses cookies to enhance usability and provide you with a more personal experience. By using this website, you agree to our use of cookies as explained in our Privacy Policy.