Spoofing mails sent by Gmail ids by exploiting Google's vulnerability
Malicious actors used Google's vulnerability to send malicious spoofing mails to targeted individuals.
Identity misrepresentation is used by the scammers which takes place through a classical email spoofing attack in which the “From” value of the mail received is tampered with. Sender policy framework and Domain-based Message Authentication, Reporting, and Conformance are the rules that prevent spoofing.
These rules prevent attackers to use their services to send out malicious mails and also informs the user if their is any malicious email in their inbox. In a recent spoofing scam the hackers were able to bypass these rules and found their way to the user inbox.
By using custom email routing rules, a user could also change the email recipient’s address redirecting any incoming emails. In the attack launched by hackers, the emails were declared completely safe by the SPF and DMARC rule.
The flaw was reported to Google and it has been taken care of by the organization. Google however took quite a long period to respond to this vulnerability and this has caused a sense of negligence from the organization's end.
Install NPAV on your devices to keep them safe and secure from all kinds of spoofing scams. NPAV provides best in class security from all kinds of cyber attacks.
Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)