Attacks take advantage of popular services, including Google Forms and Google Docs. Source