Phishers Exploit Google OAuth & DKIM to Deliver Fake Emails That Pass as Legitimate

A sophisticated phishing technique has been uncovered where attackers abuse Google’s OAuth system and DKIM verification to send emails that appear to come from no-reply@google.com, but actually lead users to fake support portals aimed at credential theft.
- Attackers exploit Google OAuth and DKIM replay to deliver emails that pass all security checks.
- Emails appear to be legitimate Google security alerts, even blending seamlessly into users’ inboxes alongside real messages.
- The phishing email links to a fake Google support portal hosted on sites.google.com, making it look authentic.
- The fraudulent message is signed with a valid Google DKIM key, bypassing email authentication filters.
- The attacker registers a Google account with an address like me@maliciousdomain.com and uses the OAuth app name as the phishing message itself.
- Google automatically sends a security alert after OAuth access is granted—this alert is forwarded to victims and passes all authenticity checks.
- Gmail UI displays the forged email as if it’s addressed to the recipient, thanks to the clever use of the “me@” email handle.
- Similar DKIM abuse tactics have been observed with PayPal, using their “gift address” feature to relay phishing emails through PayPal’s servers.
- Despite initially claiming the system was functioning as intended, Google has now acknowledged the risk and is working on a fix.
This DKIM replay phishing attack reveals a dangerous blind spot in trusted infrastructure. When cybercriminals can weaponize security alerts from platforms like Google and PayPal, even tech-savvy users are at risk. Organizations and individuals must remain cautious, double-check URLs, and never enter credentials unless on the official domain. Net Protector advises all users to enable two-factor authentication and deploy advanced anti-phishing solutions to stay ahead of such evolving threats.
- Other (42)
- Ransomware (142)
- Events and News (27)
- Features (45)
- Security (466)
- Tips (79)
- Google (23)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (44)
- Malware Alerts (212)
- Cyber Attack (259)
- Data Backup (11)
- Data Breach (97)
- Phishing (154)
- Securty Tips (1)
- Browser Hijack (18)
- Adware (15)
- Email And Password (68)
- Android Security (70)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (8)
- vulnerability (56)
- Hacker (31)
- Spyware (9)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (4)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (11)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (10)
- Impersonation phishing (1)
- DDoS (5)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)