Google’s Phishing Fiasco: When Sophisticated Scams Meet Security Slip-Ups
In an extremely sophisticated phishing attack, threat actors used Google’s infrastructure to send bogus emails, tricking recipients into credential-stealing traps. The emails, appearing legit with a valid DKIM signature, reroute victims via Google Sites to fake sign-in pages. Google has since rolled out fixes to stop this abuse pathway.

Hot Take:
Looks like the phishers have graduated from under the bridge to the Google Cloud! With sophisticated attacks using Google’s own infrastructure, it seems like the hackers have finally found a way to give Gmail’s spam filter a nervous breakdown. And who knew Google Sites would become the new hotspot for digital con artists? Maybe next, they’ll be selling beachfront property in Antarctica!
Key Points:
- Threat actors used Google’s infrastructure to send phishing emails, making them appear legitimate and bypassing security checks.
- The phishing attack involved a fake Google Support page on Google Sites, tricking users into entering their credentials.
- This attack was characterized as a DKIM replay attack, leveraging Google OAuth applications.
- Google has rolled out fixes to prevent this attack vector and encourages the use of two-factor authentication.
- Phishing campaigns are increasingly using SVG attachments to execute HTML code and redirect users to fake login pages.
Already a member? Log in here