Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Posted on January 2, 2026January 2, 2026 By CWS

Jan 02, 2026Ravie LakshmananCloud Safety / E mail Safety
Cybersecurity researchers have disclosed particulars of a phishing marketing campaign that entails the attackers impersonating reliable Google-generated messages by abusing Google Cloud’s Software Integration service to distribute emails.
The exercise, Verify Level stated, takes benefit of the belief related to Google Cloud infrastructure to ship the messages from a reliable e-mail tackle (“noreply-application-integration@google[.]com”) in order that they will bypass conventional e-mail safety filters and have a greater probability of touchdown in customers’ inboxes.
“The emails mimic routine enterprise notifications comparable to voicemail alerts and file entry or permission requests, making them seem regular and reliable to recipients,” the cybersecurity firm stated.
Attackers have been noticed sending 9,394 phishing emails focusing on roughly 3,200 prospects over a 14-day interval noticed in December 2025, with the affected organizations positioned within the U.S., Asia-Pacific, Europe, Canada, and Latin America.

On the coronary heart of the marketing campaign is the abuse of Software Integration’s “Ship E mail” job, which permits customers to ship customized e-mail notifications from an integration. Google notes in its assist documentation that solely a most of 30 recipients might be added to the duty.
The truth that these emails might be configured to be despatched to any arbitrary e-mail addresses demonstrates the risk actor’s means to misuse a reliable automation functionality to their benefit and ship emails from Google-owned domains, successfully bypassing DMARC and SPF checks.
“To additional enhance belief, the emails intently adopted Google notification fashion and construction, together with acquainted formatting and language,” Verify Level stated. “The lures generally referenced voicemail messages or claims that the recipient had been granted entry to a shared file or doc, comparable to entry to a ‘This autumn’ file, prompting recipients to click on embedded hyperlinks and take quick motion.”

The assault chain is a multi-stage redirection stream that commences when an e-mail recipient clicks on a hyperlink hosted on storage.cloud.google[.]com, one other trusted Google Cloud service. The hassle is seen as one other effort to decrease person suspicion and provides it a veneer of legitimacy.
The hyperlink then redirects the person to content material served from googleusercontent[.]com, presenting them with a pretend CAPTCHA or image-based verification that acts as a barrier by blocking automated scanners and safety instruments from scrutinizing the assault infrastructure, whereas permitting actual customers to cross by.
As soon as the validation part is full, the person is taken to a pretend Microsoft login web page that is hosted on a non-Microsoft area, finally stealing any credentials entered by the victims.

In response to the findings, Google has blocked the phishing efforts that abuse the e-mail notification function inside Google Cloud Software Integration, including that it is taking extra steps to forestall additional misuse.
Verify Level’s evaluation has revealed that the marketing campaign has primarily focused manufacturing, know-how, monetary, skilled providers, and retail sectors, though different trade verticals, together with media, training, healthcare, vitality, authorities, journey, and transportation, have been singled out.
“These sectors generally depend on automated notifications, shared paperwork, and permission-based workflows, making Google-branded alerts particularly convincing,” it added. “This marketing campaign highlights how attackers can misuse reliable cloud automation and workflow options to distribute phishing at scale with out conventional spoofing.”

The Hacker News Tags:Abuse, Campaign, Cloud, Cybercriminals, Email, Feature, Google, MultiStage, Phishing

Post navigation

Previous Post: Lessons From Mongobleed Vulnerability (CVE-2025-14847) That Actively Exploited In The Wild
Next Post: Adobe ColdFusion Servers Targeted in Coordinated Campaign

Related Posts

China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community The Hacker News
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers The Hacker News
NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers The Hacker News
How CISOs Can Drive Effective AI Governance The Hacker News
CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems The Hacker News
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment
  • Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
  • Tim Kosiba Named NSA Deputy Director
  • Cyber Threats Targeting Australia and New Zealand Fueled by Initial Access Sales, and Ransomware Campaigns

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark