

It is usually used to collect confidential information of the targeted users. Spear phishing attacks are ones where users are inadvertently made to open files that have malware. What’s more is that the Chrome browser implicitly trusts the files downloaded through Google Drive, even when other antivirus software detect or suspect malware.

This loophole can be used by cybercriminals for spear phishing attacks. This leaves them vulnerable since they might not know about their legitimate file having been replaced with a malicious one until they have already downloaded it. According to Nikoci, when a malicious file replaces the old file and users preview this file online, they are not made aware of any change.
