Google Drive Allows Malware to Remain Online for 27 Days (and counting) -  [UPDATED 2017-09-06]

Recently, we've started seeing a new type of spam-driven EMail scam involving fake purchase orders. We've seen two or three different examples of the scam, but they all share some common traits: they come from GMail accounts (and one example use an address as the reply-to), the malicious files are hidden inside less-common archive formats such as .ACE and .REV (presumably to avoid detection by virus scanners), the spamming operation seems to be a bit more interactive in that they don't send the malware attachments/links unless you reply (presumably to avoid revealing their malware unless they think they have a "live one" on the hook), and they all use Google drive to host the files - in addition to sending them by EMail.

Naturally, we reported all of the offending GMail address & malicious Google drive links to Google (via Spamcop). Now, if you've read the title of this post - or you've ever personally tried to get Google to shut down malicious content/accounts in the past - then you can successfully guess what the result (or lack thereof) has been. But, if you're curious, read on for the details.

The first example of this spam that we received this summer arrived on August 8th: it came from someone claiming to be "jessie ganda" & using the EMail address - out of curiousity for how the scam worked, I decided to play along and reply. Two days later, on August 10th, the scammer replied by sending me a Google drive link to the supposed purchase order document - which was actually a .ACE archive containing a .EXE file (in other words, obvious malware).

The link pointed to the URL - WARNING: that URL goes to page with a link to a malicious file that could seriously harm your computer if opened, the URL is included only for the purpose of documentation.

Both the link and the offending EMail address were reported to Google on the same day - August 10th. Yet as of the time of this writing, the link is still active and Google is still hosting the malicious file, and test messages sent to the don't bounce back, so it still appears to be active as well. For a multi-billion dollar, multinational tech company, taking that long to remove malware from their servers would be inexcusable even if they had actually dealt with the problem - which they haven't. Due to Google's continued failure to address any part of the issue, I've re-reported both spam EMails to them directly via the & addresses, as well as reporting the malicious file via the Google drive web interface.

When (or if) Google gets around to actually doing anything about the malware they're knowingly hosting & the spam that they're facilitating, we'll update this article. Personally, I'm curious to see if they manage to address both parts of the issue (the spammer GMail account and the Google Drive-hosted malware), or if they pull an OVH and only deal with part of the problem.

UPDATE 2017-08-29: nearly a week has passed since this post was originally published - yet in that time, Google still has not done anything about the malicious files that they are hosting: the URL is still active ( and Google is still allowing downloads of the file. As such, given that the issue has been reported multiple times & was first reported more than two weeks ago, it appears that Google is knowingly allowing their servers to be used for distribution of malicious software.

It's also worth noting that the same group of spammers have sent us additional spam EMails (also from GMail accounts), containing a different to a malicious file, which of course is also hosted on Google Drive - and as should come as no surprise, Google hasn't done anything about that either (the offending GMail account still appears to be active, and the malicious file is still available for download). Given the circumstances, we've decided to give Google one more day to address the issue, which will be a full 20 days (four business weeks) since the issue was first reported - after that, we'll start re-resending reports of the spam EMails/accounts & the malicious files once per day and see how long it takes them to deal with the issues then.

UPDATE 2017-09-01: another three days have passed since the last update, and Google has still failed to take any evidence steps to address the issue (the malicious files are still available for download, and the GMail accounts that sent them still appear to be active) - bringing us to a total of 21 days since we first reported the issue to Google. Starting on August 30th, which was the 20 day point, we began reporting the malicious Google Docs link daily, using the "Report abuse" link on the same page - and so far, it appears that Google is ignoring those reports as well.

UPDATE 2017-09-06: another 5 days, and Google continues to allow the use of their servers to distribute malware - despite the previous reports that we sent, and the daily reports that we've been sending since August 30th. Right now, I'd put good odds on Google ignoring the issue for a full month - at that point, maybe we'll start sending them links to the malware via Twitter.


Linux and Windows web hosting plans start at just $7.95/mo.