Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins

New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins

Posted on January 6, 2026January 6, 2026 By CWS

Cybersecurity researchers have uncovered a harmful new phishing marketing campaign that tips customers into surrendering their credentials by impersonating respectable Google assist and notifications.

The assault combines vishing (voice phishing), spoofed domains, and Google’s personal trusted infrastructure to realize distinctive success charges towards organizations worldwide.

The assault employs a multi-layered social engineering method. Risk actors provoke contact by cellphone, utilizing voice-spoofing know-how to imitate Google assist representatives.

These calls reference suspicious account exercise or safety considerations, constructing urgency and belief.

Google Help-Primarily based Phishing Marketing campaign

The attacker then directs victims to click on hyperlinks in follow-up emails that seem to originate from respectable Google addresses, bypassing conventional electronic mail authentication checks like SPF, DKIM, and DMARC.

What makes this marketing campaign significantly insidious is its abuse of Google’s personal cloud infrastructure.

Somewhat than creating pretend domains which may set off safety filters, attackers leverage Google Cloud Software Integration companies to ship phishing emails straight from respectable Google infrastructure.

In December 2025 alone, researchers documented over 9,000 phishing emails focusing on roughly 3,200 companies throughout the USA, Europe, Asia-Pacific, Canada, and Latin America.

The assault stream follows a complicated redirection chain. When victims click on embedded hyperlinks, they land on pages hosted on trusted Google Cloud Storage domains, making URL repute filters ineffective.

These pages show pretend CAPTCHA verification screens that block automated safety scanning whereas permitting human customers via, as reported by Dmitrn Gmilnanets.

After verification, victims are redirected to credential-harvesting pages that mimic Google login screens or Microsoft 365 interfaces, the place their usernames and passwords are stolen.

Safety consultants emphasize that cloud suppliers by no means provoke contact to request login credentials or direct customers to exterior verification pages.

Pretend Google Cloud Help electronic mail

Customers ought to all the time navigate on to official service portals they already use somewhat than clicking hyperlinks in unsolicited communications.

Organizations ought to implement multi-factor authentication (MFA), implement the usage of a password supervisor, prohibit login areas by IP vary, and supply common safety consciousness coaching.

Moreover, safety groups should transfer past conventional domain-reputation defenses and implement behavioral evaluation and contextual menace detection to determine respectable infrastructure that’s being weaponized for malicious functions.

This marketing campaign underscores a important shift in phishing ways: attackers are more and more abusing respectable platforms somewhat than spoofing domains, requiring a basic rethink of electronic mail safety methods.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Google, Logins, Mimic, Phishing, Sophisticated, Steal, Support

Post navigation

Previous Post: Threat Actors Hacked Global Companies via Leaked Cloud Credentials from Infostealer Infections
Next Post: Cybersecurity M&A Roundup: 30 Deals Announced in December 2025

Related Posts

Washington Post Oracle E-Suite Hack Impacts 9K+ Employees and Contractors Washington Post Oracle E-Suite Hack Impacts 9K+ Employees and Contractors Cyber Security News
The Rise of Subscription-Based Cybercrime The Rise of Subscription-Based Cybercrime Cyber Security News
Beware of Fake WinRAR Website That Delivers Malware with WinRAR Installer Beware of Fake WinRAR Website That Delivers Malware with WinRAR Installer Cyber Security News
First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology First Known LLM-Powered Malware From APT28 Hackers Integrates AI Capabilities into Attack Methodology Cyber Security News
Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data Cyber Security News
Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024 Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News