Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Suspension on state AI regulations clears Senate hurdles

LinkedIn CEO says AI writing assistants aren’t as popular as they’d expect

How a hardware wallet protects your private key: Security and safety instructions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Phishers abuse Google sites and DKIM replays to send signed emails and steal credentials
Identity

Phishers abuse Google sites and DKIM replays to send signed emails and steal credentials

userBy userApril 22, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Phishers exploits Google Sites and DKIM Replays

What is described as a “very sophisticated phishing attack,” threat actors have leveraged an unusual approach that allows them to send fake emails through Google’s infrastructure and redirect message recipients to fraudulent sites that collect qualifications.

“The first thing to note is that this is a valid and signed email. It really came from no-reply@google.com,” said Nick Johnson, lead developer at Ethereum Name Service (ENS), in a series of X’s posts.

“You pass the DKIM signature check and Gmail will appear without warning. You will even post it in the same conversation as other legitimate security alerts.”

Email messages will notify you of future targets of law enforcement subpoena seeking unspecified content that exists in your Google account and encourage you to click on the site.[.]A com url to “examine case materials or take steps to submit a protest.”

Cybersecurity

The Google Sites URL will display a visually-like page that impersonates a legitimate Google Support page and includes a button that includes “Upload additional documents” or “Viewcase.” Click on any of the options and the victim will be on the Replica Google Account Sign-in page. The only difference is that it is hosted on Google sites.

“sites.google.com is a legacy product before Google took security seriously. It allows users to host content in Google.com subdomains and, importantly, supports any scripting and embedding,” Johnson said.

“Obviously this makes building a qualification harvesting site trivial. They need to prepare to upload new versions so that older versions are defeated by Google’s abuse team. They help attackers have no way of reporting abuse through the site interface.”

A clever aspect of the attack is the fact that the email message has a “signed” header set in “accounts.google”.[.]com “Even though I have a “mail” header (“fwd-04-1.fwd.privateemail with a completely unrelated domain”[.]com “).

Phishers exploits Google Sites and DKIM Replays

Malicious activity is characterized as a DKIM replay attack in which the attacker first creates a Google account for the newly created domain (“me@”), then creates a Google OAuth application with the name that contains the entire content of the phishing message.

“Now they’re giving OAuth app access to their ‘me@…’ Google account,” Johnson said. “This will generate a ‘Security Alert’ message from Google and send it to your email address “Me@…”. Google generated an email so it will be signed with a valid DKIM key and pass all checks. ”

The attacker will proceed to forward the same message from Outlook account to keep DKIM signatures intact and bypass the email security filters, according to EasedMarc. Messages are then relayed through a custom simple email transfer protocol (SMTP) service called Jellyfish, which makes it easier for Namecheap’s private email infrastructure to forward emails to targeted Gmail accounts.

“At this point, the email has arrived in the victim’s inbox, which appears to be a valid message from Google, indicating that all authentication checks have passed SPF, DKIM and DMARC,” said Gerasim Hovhannisyan, CEO of EasedMarc.

“They named Google Account ‘me@’, so Gmail indicates that the message was sent to ‘Me’ at the top. This is the shorthand used when a message is addressed to your email address. Avoid other signs that you might send a red flag,” Johnson pointed out.

When it reached the comment, Google told Hacker News that a fix was deployed to stop the abuse route, emphasizing that it would not ask for account credentials such as a password or a one-time password, or call users directly.

Cybersecurity

“We know of this class of targeted attacks from this threat actor and are deploying protections to close this path due to abuse,” a Google spokesperson said. “In the meantime, users are encouraging them to adopt two-factor authentication and PassKeys, which provides strong protection against these types of phishing campaigns.”

The disclosure comes nine months after Guardio Labs unveiled the misconceptions currently being patched to the defense of email security vendor Proofpoint, and became available to send millions of messages that evoke a variety of popular companies, including Best Buy, IBM, Nike, Walt Disney, and bypass authentication measures.

It also triggers the execution of HTML code, consistent with a surge in phishing campaigns using attachments in Scalable Vector Graphics (SVG) format.

Russian cybersecurity company Kaspersky said it has observed over 4,100 phishing emails, including SVG attachments, since its launch in 2025.

“The Fishers are relentlessly exploring new techniques to avoid detection,” Kaspersky said. “They change their tactics, sometimes employ user redirection and text obfuscation, and experiment with different attachment formats in other cases. The SVG format provides the ability to embed HTML and JavaScript code in images that attackers misuse.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleManychat taps $140 million to boost its business messaging platform with AI
Next Article Five major concerns about employees using browsers
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Suspension on state AI regulations clears Senate hurdles

LinkedIn CEO says AI writing assistants aren’t as popular as they’d expect

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.