Gmail users targeted in credential phishing campaign exploiting Google infrastructure

Google has confirmed a sophisticated phishing attack affecting Gmail users globally, following public disclosure by Ethereum developer Nick Johnson. The attacker exploited Google’s legitimate infrastructure, specifically Google Sites, to host malicious pages that closely mimicked official Google services. The phishing emails impersonated Google Security, claiming the user had received a legal subpoena requiring urgent action. The embedded links directed victims to highly convincing replicas of Google’s support portals, prompting users to enter their credentials. These malicious emails passed DKIM authentication, appeared to originate from trusted Google domains, and were not flagged by Gmail’s security systems. Google responded by deactivating the specific attack vector and issued public guidance urging the use of two-factor authentication and passkeys.

Analysis from our experts


This campaign exemplifies a high-risk evolution in credential phishing: the combination of social engineering with abuse of legitimate cloud platforms to bypass detection. By leveraging Google’s own infrastructure, attackers eroded traditional trust boundaries and gained credibility with users and mail filters alike. The passing of DKIM checks and placement within legitimate email threads indicates a mature understanding of authentication mechanisms and message hygiene. The lure, a fake legal subpoena, is tailored to provoke panic and immediate action, increasing the likelihood of success. While Google’s post-incident mitigations are timely, the delayed recognition of the exploit highlights the ongoing challenge of monitoring abuse within trusted ecosystems.

The attack also reinforces the importance of passkeys and phishing-resistant MFA as a baseline defense.

Technically, this is not novel, but operationally, it is precise, targeted and well-executed, demonstrating how adversaries are increasingly adapting to modern security controls rather than bypassing them outright.

Read the full article here.

Stay informed with us!

You can subscribe to our monthly cybersecurity newsletter to receive updates about us and the industry

Blog

Check the latest updates on threats, stories, events and analysis.

New Twint Cyber Threat in 2025 | How Protect Yourself | ZENDATA

New Twint Cyber Threat in 2025

Logitech Targeted in Clop Cyberattack | ZENDATA Insight

Logitech Named in Cyberattack interview in Le Temps

Inside ZENDATA’s AI Powered SOC Dubai: How L1, L2 and L3 Cybersecurity Services Protect Your Business 24/7

Inside our AI Powered SOC in Dubai