Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins

New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins

Posted on January 6, 2026January 6, 2026 By CWS

Cybersecurity researchers have uncovered a harmful new phishing marketing campaign that tips customers into surrendering their credentials by impersonating respectable Google assist and notifications.

The assault combines vishing (voice phishing), spoofed domains, and Google’s personal trusted infrastructure to realize distinctive success charges towards organizations worldwide.

The assault employs a multi-layered social engineering method. Risk actors provoke contact by cellphone, utilizing voice-spoofing know-how to imitate Google assist representatives.

These calls reference suspicious account exercise or safety considerations, constructing urgency and belief.

Google Help-Primarily based Phishing Marketing campaign

The attacker then directs victims to click on hyperlinks in follow-up emails that seem to originate from respectable Google addresses, bypassing conventional electronic mail authentication checks like SPF, DKIM, and DMARC.

What makes this marketing campaign significantly insidious is its abuse of Google’s personal cloud infrastructure.

Somewhat than creating pretend domains which may set off safety filters, attackers leverage Google Cloud Software Integration companies to ship phishing emails straight from respectable Google infrastructure.

In December 2025 alone, researchers documented over 9,000 phishing emails focusing on roughly 3,200 companies throughout the USA, Europe, Asia-Pacific, Canada, and Latin America.

The assault stream follows a complicated redirection chain. When victims click on embedded hyperlinks, they land on pages hosted on trusted Google Cloud Storage domains, making URL repute filters ineffective.

These pages show pretend CAPTCHA verification screens that block automated safety scanning whereas permitting human customers via, as reported by Dmitrn Gmilnanets.

After verification, victims are redirected to credential-harvesting pages that mimic Google login screens or Microsoft 365 interfaces, the place their usernames and passwords are stolen.

Safety consultants emphasize that cloud suppliers by no means provoke contact to request login credentials or direct customers to exterior verification pages.

Pretend Google Cloud Help electronic mail

Customers ought to all the time navigate on to official service portals they already use somewhat than clicking hyperlinks in unsolicited communications.

Organizations ought to implement multi-factor authentication (MFA), implement the usage of a password supervisor, prohibit login areas by IP vary, and supply common safety consciousness coaching.

Moreover, safety groups should transfer past conventional domain-reputation defenses and implement behavioral evaluation and contextual menace detection to determine respectable infrastructure that’s being weaponized for malicious functions.

This marketing campaign underscores a important shift in phishing ways: attackers are more and more abusing respectable platforms somewhat than spoofing domains, requiring a basic rethink of electronic mail safety methods.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Google, Logins, Mimic, Phishing, Sophisticated, Steal, Support

Post navigation

Previous Post: Threat Actors Hacked Global Companies via Leaked Cloud Credentials from Infostealer Infections
Next Post: Cybersecurity M&A Roundup: 30 Deals Announced in December 2025

Related Posts

SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials Cyber Security News
Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Cyber Security News
Scattered Lapsus$ Hunters Claim to Have Stolen More Than 1 Billion Salesforce Records Scattered Lapsus$ Hunters Claim to Have Stolen More Than 1 Billion Salesforce Records Cyber Security News
Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails Microsoft Defender for Office 365 to Provide Detail Results for Spam, Phishing or Clean Emails Cyber Security News
Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode Cyber Security News
Microsoft to Block External Scripts  in Entra ID Logins to Enhance Protections Microsoft to Block External Scripts  in Entra ID Logins to Enhance Protections Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark