Google's email spoofed by cunning phisherfolk
- Attackers launched a DKIM replay phishing campaign by spoofing a Google security alert.
- A weakness in Google's system allowed attackers to send a fake email that appeared legitimate.
- The fraudulent email, appearing as no-reply@google.com, directed recipients to a fake support portal.
- Nick Johnson noted the portal's URL as a hint: "sites.google.com" instead of "accounts.google.com."
- Google recognized the OAuth issue and is working on a fix to prevent future attacks.
17 Articles
17 Articles


Phishers abuse Google OAuth to spoof Google in DKIM replay attack
In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google's systems, passing all verifications but pointing to a fraudulent page that collected logins.
Legacy Google Service Abused in Phishing Attacks
A sophisticated phishing campaign abuses weakness in Google Sites to spoof Google no-reply addresses and bypass protections. The post Legacy Google Service Abused in Phishing Attacks appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original… Read more → The post Legacy Google Service Abused in Phishing Attacks appeared first on IT Security News.
Coverage Details
Bias Distribution
- 100% of the sources are Center
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage