Gmail users targeted in credential phishing campaign exploiting Google infrastructure

Google has confirmed a sophisticated phishing attack affecting Gmail users globally, following public disclosure by Ethereum developer Nick Johnson. The attacker exploited Google’s legitimate infrastructure, specifically Google Sites, to host malicious pages that closely mimicked official Google services. The phishing emails impersonated Google Security, claiming the user had received a legal subpoena requiring urgent action. The embedded links directed victims to highly convincing replicas of Google’s support portals, prompting users to enter their credentials. These malicious emails passed DKIM authentication, appeared to originate from trusted Google domains, and were not flagged by Gmail’s security systems. Google responded by deactivating the specific attack vector and issued public guidance urging the use of two-factor authentication and passkeys.

Analysis from our experts


This campaign exemplifies a high-risk evolution in credential phishing: the combination of social engineering with abuse of legitimate cloud platforms to bypass detection. By leveraging Google’s own infrastructure, attackers eroded traditional trust boundaries and gained credibility with users and mail filters alike. The passing of DKIM checks and placement within legitimate email threads indicates a mature understanding of authentication mechanisms and message hygiene. The lure, a fake legal subpoena, is tailored to provoke panic and immediate action, increasing the likelihood of success. While Google’s post-incident mitigations are timely, the delayed recognition of the exploit highlights the ongoing challenge of monitoring abuse within trusted ecosystems.

The attack also reinforces the importance of passkeys and phishing-resistant MFA as a baseline defense.

Technically, this is not novel, but operationally, it is precise, targeted and well-executed, demonstrating how adversaries are increasingly adapting to modern security controls rather than bypassing them outright.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

Discord ID card breach

When Customer Support Becomes the Weakest Link: Lessons from the Discord Breach

How Businesses Can Protect Themselves From MatrixPDF Attacks

MatrixPDF Puts Gmail Users at Risk with Malicious PDF Attachments

Swiss e-ID and UAE Pass

Swiss e-ID vs UAE Pass: managing digital government identity