Google’s Spear Phishing Slip-Up: When “Less Secure Apps” Aren’t Just a Suggestion!
Giles was nearly hooked by a sophisticated spear phishing campaign using app-specific passwords on Google accounts. The Citizen Lab researchers noted the attackers’ patience and adaptability. Google later swooped in to mitigate the attack, reminding users to keep an eye on those pesky, less secure apps.

Hot Take:
When it comes to cybersecurity, you don’t need to be a tech wizard to spot a phishing attempt—you just need to be suspicious enough to ask, “Why does this email smell fishy?” And remember, folks: when an email claims to be from the government and wants your password, it’s probably more of a “take” than a “give.”
Key Points:
- The attack involved creating an app-specific password (ASP) to access secure government resources.
- ASP is a workaround for apps that don’t support multi-factor authentication (MFA).
- The phishing attempt was sophisticated, with attackers adapting their approach based on the victim’s responses.
- Google has been phasing out support for Less Secure Apps (LSAs) but ASPs can still be created on personal accounts.
- Google’s mitigation recommendations include avoiding ASPs for high-risk accounts and regularly monitoring account activity.
Already a member? Log in here