Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins

New Sophisticated Phishing Attack Mimic as Google Support to Steal Logins

Posted on January 6, 2026January 6, 2026 By CWS

Cybersecurity researchers have uncovered a harmful new phishing marketing campaign that tips customers into surrendering their credentials by impersonating respectable Google assist and notifications.

The assault combines vishing (voice phishing), spoofed domains, and Google’s personal trusted infrastructure to realize distinctive success charges towards organizations worldwide.

The assault employs a multi-layered social engineering method. Risk actors provoke contact by cellphone, utilizing voice-spoofing know-how to imitate Google assist representatives.

These calls reference suspicious account exercise or safety considerations, constructing urgency and belief.

Google Help-Primarily based Phishing Marketing campaign

The attacker then directs victims to click on hyperlinks in follow-up emails that seem to originate from respectable Google addresses, bypassing conventional electronic mail authentication checks like SPF, DKIM, and DMARC.

What makes this marketing campaign significantly insidious is its abuse of Google’s personal cloud infrastructure.

Somewhat than creating pretend domains which may set off safety filters, attackers leverage Google Cloud Software Integration companies to ship phishing emails straight from respectable Google infrastructure.

In December 2025 alone, researchers documented over 9,000 phishing emails focusing on roughly 3,200 companies throughout the USA, Europe, Asia-Pacific, Canada, and Latin America.

The assault stream follows a complicated redirection chain. When victims click on embedded hyperlinks, they land on pages hosted on trusted Google Cloud Storage domains, making URL repute filters ineffective.

These pages show pretend CAPTCHA verification screens that block automated safety scanning whereas permitting human customers via, as reported by Dmitrn Gmilnanets.

After verification, victims are redirected to credential-harvesting pages that mimic Google login screens or Microsoft 365 interfaces, the place their usernames and passwords are stolen.

Safety consultants emphasize that cloud suppliers by no means provoke contact to request login credentials or direct customers to exterior verification pages.

Pretend Google Cloud Help electronic mail

Customers ought to all the time navigate on to official service portals they already use somewhat than clicking hyperlinks in unsolicited communications.

Organizations ought to implement multi-factor authentication (MFA), implement the usage of a password supervisor, prohibit login areas by IP vary, and supply common safety consciousness coaching.

Moreover, safety groups should transfer past conventional domain-reputation defenses and implement behavioral evaluation and contextual menace detection to determine respectable infrastructure that’s being weaponized for malicious functions.

This marketing campaign underscores a important shift in phishing ways: attackers are more and more abusing respectable platforms somewhat than spoofing domains, requiring a basic rethink of electronic mail safety methods.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Google, Logins, Mimic, Phishing, Sophisticated, Steal, Support

Post navigation

Previous Post: Threat Actors Hacked Global Companies via Leaked Cloud Credentials from Infostealer Infections
Next Post: Cybersecurity M&A Roundup: 30 Deals Announced in December 2025

Related Posts

Apache Struts 2 DoS Vulnerability Let Attackers Crash Server Apache Struts 2 DoS Vulnerability Let Attackers Crash Server Cyber Security News
Urgent Chrome Update Fixes Critical Security Issues Urgent Chrome Update Fixes Critical Security Issues Cyber Security News
MITRE Publishes Post-Quantum Cryptography Migration Roadmap MITRE Publishes Post-Quantum Cryptography Migration Roadmap Cyber Security News
Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors Cyber Security News
Meta Unveils Advanced Anti-Scam Features on Key Platforms Meta Unveils Advanced Anti-Scam Features on Key Platforms Cyber Security News
New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals New Trends in Phishing Attacks Emerges as AI Reshaping the Tool used by Cybercriminals Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark