‘We Add New Photos’ — Google Photos Scam Email

Scammers are constantly finding new ways to exploit unsuspecting individuals, and one of the latest tactics involves a phishing email disguised as a notification from Google Photos. This scam email, titled ‘We Add New Photos,’ aims to trick recipients into clicking on a malicious link that can lead to identity theft, financial loss, or the installation of malware on their devices. In this article, we will delve into the details of this scam, how it works, what to do if you have fallen victim, technical aspects of the scam, and provide statistics to support our points.

Scams

What is the ‘We Add New Photos’ Scam Email?

The ‘We Add New Photos’ scam email is a phishing attempt that impersonates Google Photos, a popular cloud storage service for photos and videos. The email appears to be a legitimate notification from Google Photos, informing the recipient that new photos have been added to their account. It often includes a subject line like “New photos added to your Google Photos” or “Your Google Photos account has been updated.”

The email contains a message that urges the recipient to click on a link to view the new photos. However, this link is not what it seems. Instead of directing the user to their Google Photos account, it leads to a fraudulent website designed to steal personal information or infect the user’s device with malware.

How Does the Scam Work?

The ‘We Add New Photos’ scam email relies on social engineering techniques to deceive recipients and trick them into taking action. Here is a step-by-step breakdown of how the scam typically unfolds:

  1. The scammer crafts an email that appears to be from Google Photos, using official logos, colors, and formatting to make it look authentic.
  2. The email subject line grabs the recipient’s attention by mentioning new photos added to their account.
  3. The body of the email contains a message that creates a sense of urgency or curiosity, prompting the recipient to click on the link to view the photos.
  4. When the recipient clicks on the link, they are redirected to a fake website that closely resembles the legitimate Google Photos login page.
  5. The fake website prompts the user to enter their Google account credentials, including their email address and password.
  6. Once the user enters their login information, the scammers capture it and can use it for various malicious purposes, such as identity theft or unauthorized access to the victim’s accounts.

It is important to note that scammers may also use other techniques, such as installing malware on the victim’s device or redirecting them to additional fraudulent websites that request more personal information.

What to Do If You Have Fallen Victim?

If you have fallen victim to the ‘We Add New Photos’ scam email or any similar phishing attempt, it is crucial to take immediate action to protect yourself and minimize the potential damage. Here are the steps you should follow:

  1. Change your passwords: Start by changing the password for your Google account. Additionally, if you have used the same password for other accounts, change those passwords as well to prevent unauthorized access.
  2. Enable two-factor authentication (2FA): Set up two-factor authentication for your Google account and any other accounts that offer this security feature. This adds an extra layer of protection by requiring a verification code in addition to your password.
  3. Scan your device for malware: Run a scan with a reputable antivirus or anti-malware software, such as Malwarebytes Free, to detect and remove any malicious software that may have been installed on your device.
  4. Monitor your accounts: Keep a close eye on your financial accounts, email, and other online accounts for any suspicious activity. Report any unauthorized transactions or changes immediately.
  5. Report the scam: Report the phishing email to Google by marking it as spam or phishing. This helps Google improve its filters and protect other users from falling victim to the same scam.

Technical Details of the Scam

The ‘We Add New Photos’ scam email utilizes various techniques to appear legitimate and deceive recipients. Here are some technical details of the scam:

  • Email spoofing: Scammers often use email spoofing techniques to make the email appear as if it is coming from a legitimate source, such as Google Photos. They manipulate the email headers to make it seem like the email originated from a trusted domain.
  • Phishing website: The link in the email leads to a phishing website that closely mimics the legitimate Google Photos login page. The scammers create these websites to trick users into entering their login credentials.
  • Malware distribution: In some cases, clicking on the link in the email may lead to the installation of malware on the user’s device. This malware can be used to steal sensitive information, monitor online activities, or gain unauthorized access to the victim’s accounts.

Statistics on Phishing Scams

Phishing scams, including those disguised as Google Photos notifications, continue to be a significant threat to individuals and organizations. Here are some statistics that highlight the prevalence and impact of phishing scams:

  • According to the 2021 Verizon Data Breach Investigations Report, phishing was the most common type of social engineering attack, accounting for 36% of all breaches.
  • The 2021 Phishing Activity Trends Report by the Anti-Phishing Working Group (APWG) revealed that there were over 222,000 unique phishing websites detected in the first quarter of 2021 alone.
  • In a study conducted by Google, it was found that 45% of phishing attacks targeting Google users are related to account takeover, where scammers attempt to gain unauthorized access to user accounts.

Summary

The ‘We Add New Photos’ scam email is a phishing attempt that impersonates Google Photos to deceive recipients and steal their personal information or infect their devices with malware. This scam relies on social engineering techniques and often leads victims to a

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.