Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins

Posted on January 6, 2026January 6, 2026 By CWS

Cybersecurity researchers have uncovered a harmful new phishing marketing campaign that tips customers into surrendering their credentials by impersonating respectable Google assist and notifications.

The assault combines vishing (voice phishing), spoofed domains, and Google’s personal trusted infrastructure to realize distinctive success charges towards organizations worldwide.

The assault employs a multi-layered social engineering method. Risk actors provoke contact by cellphone, utilizing voice-spoofing know-how to imitate Google assist representatives.

These calls reference suspicious account exercise or safety considerations, constructing urgency and belief.

Google Help-Primarily based Phishing Marketing campaign

The attacker then directs victims to click on hyperlinks in follow-up emails that seem to originate from respectable Google addresses, bypassing conventional electronic mail authentication checks like SPF, DKIM, and DMARC.

What makes this marketing campaign significantly insidious is its abuse of Google’s personal cloud infrastructure.

Somewhat than creating pretend domains which may set off safety filters, attackers leverage Google Cloud Software Integration companies to ship phishing emails straight from respectable Google infrastructure.

In December 2025 alone, researchers documented over 9,000 phishing emails focusing on roughly 3,200 companies throughout the USA, Europe, Asia-Pacific, Canada, and Latin America.

The assault stream follows a complicated redirection chain. When victims click on embedded hyperlinks, they land on pages hosted on trusted Google Cloud Storage domains, making URL repute filters ineffective.

These pages show pretend CAPTCHA verification screens that block automated safety scanning whereas permitting human customers via, as reported by Dmitrn Gmilnanets.

After verification, victims are redirected to credential-harvesting pages that mimic Google login screens or Microsoft 365 interfaces, the place their usernames and passwords are stolen.

Safety consultants emphasize that cloud suppliers by no means provoke contact to request login credentials or direct customers to exterior verification pages.

Pretend Google Cloud Help electronic mail

Customers ought to all the time navigate on to official service portals they already use somewhat than clicking hyperlinks in unsolicited communications.

Organizations ought to implement multi-factor authentication (MFA), implement the usage of a password supervisor, prohibit login areas by IP vary, and supply common safety consciousness coaching.

Moreover, safety groups should transfer past conventional domain-reputation defenses and implement behavioral evaluation and contextual menace detection to determine respectable infrastructure that’s being weaponized for malicious functions.

This marketing campaign underscores a important shift in phishing ways: attackers are more and more abusing respectable platforms somewhat than spoofing domains, requiring a basic rethink of electronic mail safety methods.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Google, Logins, Mimic, Phishing, Sophisticated, Steal, Support

Post navigation

Previous Post: Threat Actors Hacked Global Companies via Leaked Cloud Credentials from Infostealer Infections
Next Post: Cybersecurity M&A Roundup: 30 Deals Announced in December 2025

Related Posts

LLM-Based LAMEHUG Malware Dynamically Generate Commands for Reconnaissance and Data Theft Cyber Security News
Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News
New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures Cyber Security News
How IOC Feeds Streamline Response and Threat Hunting for Best SOC Teams  Cyber Security News
NoisyBear Weaponizing ZIP Files to PowerShell Loaders and Exfiltrate Sensitive Data Cyber Security News
Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar Agent Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark