Security & Privacy

Google phishing scam e-mail deploys diabolical deceptions

Posted on by

Shady phishing emails mimic Google

A series of highly sophisticated Google phishing e-mails has been making the rounds in the past couple weeks. The scam combines a number of clever techniques to appear plausibly legitimate to the average person.

Put another way: Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites.

What are the signs to watch out for? Let’s break down this scam so you can avoid becoming a victim.

A subpoena from law enforcement?

The e-mail subject line is simply, “Security alert” — not very descriptive. The body of the e-mail is quite long, but includes phrasing similar to the following:

A subpoena was served on Google LLC requiring us to produce a copy of your Google Account content

 

Google Support Ref #: [2 digits, hyphen, 10 digits]

Transferred to Legal Investigations Support

 

Google Support Case:
https://sites.google.com/u/[scam URL]/edit

 

Google Account ID: [13-digit number beginning with 17783]

 

This notice is to alert you that a subpoena was issued to Google LLC by a law enforcement that seeks retrieval of information contained in your Google Account.

 

To examine the case materials or take measures to submit a protest, please do so in the provided Google Support Case.

The e-mail is then padded with several blank lines, followed by “Google Legal Support was granted access to your Google Account.”

But in reality, no such law enforcement subpoena exists. In fact, it’s all part of a ruse to encourage you to go to the sites.google.com URL, which is actually a phishing page; we’ll explain more about that later.

Scammers exploit Google to send the phishing e-mail

The most concerning part of this scheme is that the phishers actually trick Google’s systems into sending the phishing e-mail on their behalf.

Any would-be phisher can buy any domain name, sign up for Google Workspace, and create an app that uses OAuth to allow users to sign in using their Google account. Then they add victims to a mailing list (ideally beginning with “me@” so Gmail will show the recipient as “me”—mimicking how Gmail would display the e-mail if it were sent to their own individual address).

The name of the scammer’s OAuth app is ridiculously long; it will be the entire body of the scam e-mail, with line breaks and all, including the phishing link. (We’ll get back to the phishing page itself in a moment.)

This isn’t the first time that we’ve seen mailing lists used in a similar fashion to mass-send phishing scams through a legitimate service. In February, we previously covered a very similar scheme that exploited Microsoft services, rather than Google ones.

A big part of the problem is that, by design, a single address can be used as an e-mail distribution list; this makes it possible to send mail to all members of that list at once. But all the big service providers allow external e-mail addresses—for example, victims’ @gmail.com addresses—to be included amongst the members of these lists. This feature, while designed to be helpful, is increasingly being exploited by scammers.

Google also hosts the phishing scam page

Yet another diabolical part of the scam is that an authentic Google subdomain hosts the phishing page.

Most people are probably unaware that Google operates a service called Google Sites. This service lets anyone host a Web page under the subdomain sites.google.com. These phishing e-mails use this actual Google subdomain to appear, upon casual inspection, to be a site designed by Google itself rather than a scammer.

If a victim were to visit the sites.google.com address in the phishing e-mail and click on “View case,” they would be prompted to sign in to view the supposed support case. But the sign-in form isn’t real—it’s designed to steal the victim’s Google username and password.

If you receive an e-mail like the one described above, you can try reporting it to Google. If you’re reading it in Gmail on the Web, click on the three vertical dots (⋮) and click “🪝 Report phishing.” Or, if you’re reading it in the Gmail app on your phone, tap on the three horizontal dots (…) closest to the top-right corner of the screen, and tap “Report spam.”

It’s unlikely that Google will actually do anything, even if you report it. After all, Google’s systems really did send the message—and, technically, these Google services are operating as intended. Perhaps, given the number of tech news sites that have begun to report on this scam, someone influential at Google will pay attention and demand some internal changes to minimize the risk of similar attacks in the future.

How can I learn more?

We discussed this Google phishing scam in episode 393 of the Intego Mac Podcast:

Additionally, we’ve previously covered tons of e-mail and text message scams; check out these articles for additional details:

Each week on the Intego Mac Podcast, Intego’s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to follow the podcast to make sure you don’t miss any episodes.

You can also subscribe to our e-mail newsletter and keep an eye here on The Mac Security Blog for the latest Apple security and privacy news. And don’t forget to follow Intego on your favorite social media channels: Follow Intego on X/Twitter Follow Intego on Facebook Follow Intego on YouTube Follow Intego on LinkedIn Follow Intego on Pinterest Follow Intego on Instagram Follow the Intego Mac Podcast on Apple Podcasts

About Joshua Long

Joshua Long (@theJoshMeister), Intego's Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master's degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple ID authentication vulnerability. Josh has conducted cybersecurity research for more than 25 years, which is often featured by major news outlets worldwide. Look for more of Josh's articles at security.thejoshmeister.com and follow him on X/Twitter, LinkedIn, and Mastodon. View all posts by Joshua Long →