{"id":10263,"date":"2025-12-30T09:45:00","date_gmt":"2025-12-30T09:45:00","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=10263"},"modified":"2025-12-30T09:45:00","modified_gmt":"2025-12-30T09:45:00","slug":"new-google-themed-phishing-wave-hits-over-3000-world-organisations-hackread-cybersecurity-information-knowledge-breaches-ai-and-extra","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=10263","title":{"rendered":"New Google-Themed Phishing Wave Hits Over 3,000 World Organisations \u2013 Hackread \u2013 Cybersecurity Information, Knowledge Breaches, AI, and Extra"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>A current investigation by researchers at Test Level Concord E-mail Safety uncovered a intelligent new <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/scammers-e-signature-phishing-emails\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/scammers-e-signature-phishing-emails\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing rip-off<\/a> concentrating on companies worldwide. Over the past 14 days, it was discovered that cybercriminals have been abusing Google\u2019s personal automated methods to ship out 1000&#8217;s of malicious emails that look 100% official.<\/p>\n<h3 id=\"how-the-attack-works\" class=\"wp-block-heading\"><strong>How the Assault works<\/strong><\/h3>\n<p>In accordance with Test Level\u2019s <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/blog.checkpoint.com\/research\/phishing-campaign-leverages-trusted-google-cloud-automation-capabilities-to-evade-detection\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">report<\/a>, this newly found marketing campaign makes use of a device known as Google Cloud Software Integration. This service is often utilized by corporations to arrange workflow automation, like sending computerized alerts. Nonetheless, scammers have discovered a method to make use of this function to ship emails straight from a reliable Google deal with: <code><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/cdn-cgi\/l\/email-protection\" class=\"__cf_email__\" data-cfemail=\"c7a9a8b5a2b7abbeeaa6b7b7abaea4a6b3aea8a9eaaea9b3a2a0b5a6b3aea8a987a0a8a8a0aba2e9a4a8aa\">[email\u00a0protected]<\/a><\/code>.<\/p>\n<p>As a result of the emails come from an actual <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/fake-google-pro-trump-domain\/\" data-type=\"post\" data-id=\"47694\" target=\"_blank\" rel=\"noreferrer noopener\">Google area<\/a>, they simply bypass conventional safety filters. Probing additional, researchers discovered that the messages often appear to be commonplace workplace notifications, claiming you will have a brand new voicemail or have to view a \u201cThis fall\u201d file. As we all know it, such content material makes the emails appear to be \u201croutine enterprise notifications,\u201d which is why so many individuals belief them.<\/p>\n<h3 id=\"a-three-step-trap\" class=\"wp-block-heading\"><strong>A Three-Step Lure<\/strong><\/h3>\n<p>The scammers use a multi-stage course of to steal data. \u00a0It begins when a consumer clicks a hyperlink or button pointing to an actual <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/cloud-vulnerability-data-google-cloud-leads-risk\/\" data-type=\"link\" data-id=\"https:\/\/hackread.com\/cloud-vulnerability-data-google-cloud-leads-risk\/\">Google Cloud<\/a> web page (storage.cloud.google.com). From there, they&#8217;re despatched to a second web page (<code>googleusercontent.com<\/code>) exhibiting a pretend <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/new-obscurebat-malware-targets-users-fake-captchas\/\">CAPTCHA<\/a> take a look at. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"561\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations-1.png\" alt=\"\" class=\"wp-image-139196\" style=\"width:624px;height:auto\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations-1.png 975w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations-1-300x173.png 300w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations-1-768x442.png 768w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations-1-380x219.png 380w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations-1-800x460.png 800w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\"\/><\/a><figcaption class=\"wp-element-caption\">Phishing E-mail Samples (Supply: Test Level)<\/figcaption><\/figure>\n<\/div>\n<p>Researchers famous that is performed to dam safety instruments whereas letting actual folks by way of. Lastly, the consumer is shipped to a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/hackers-fake-microsoft-adfs-login-pages-steal-credentials\/\" data-type=\"post\" data-id=\"125565\" target=\"_blank\" rel=\"noreferrer noopener\">pretend Microsoft login web page<\/a> for credential harvesting, which is an easy method of claiming the scammers document your password the second you kind it.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations.png\"><img loading=\"lazy\" decoding=\"async\" width=\"442\" height=\"500\" src=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations.png\" alt=\"\" class=\"wp-image-139195\" srcset=\"https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations.png 442w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations-265x300.png 265w, https:\/\/hackread.com\/wp-content\/uploads\/2025\/12\/New-Google-Themed-Phishing-Wave-Hits-Over-3000-Global-Organisations-380x430.png 380w\" sizes=\"auto, (max-width: 442px) 100vw, 442px\"\/><\/a><\/figure>\n<\/div>\n<h3 id=\"who-is-being-targeted\" class=\"wp-block-heading\"><strong>Who&#8217;s Being Focused?<\/strong><\/h3>\n<p>Researchers noticed that the marketing campaign is really world. Whereas 48.6% of the targets had been in america, there was important exercise in Asia-Pacific (20.7%) and Europe (19.8%). In Latin America, Brazil (41%) and Mexico (26%) noticed probably the most hits inside that area. It&#8217;s price noting that the manufacturing and expertise sectors had been the largest targets, at 19.6% and 18.9% respectively, adopted by finance and banking at 14.8%.<\/p>\n<p>In complete, 9,394 phishing emails had been despatched to roughly 3,200 clients in simply two weeks. Google has since said that this \u201cexercise stemmed from the abuse of a workflow automation device, not a compromise of Google\u2019s infrastructure.\u201d<\/p>\n<p>Whereas the corporate has confirmed these particular campaigns are actually blocked, this incident reminds us all to stay cautious of any surprising hyperlinks, even once they seem to come back from a trusted supply.<\/p>\n<p>\n\t\t\t<\/div>\n<p><template id="2UGAvOzNjxcoq4911WFW"></template><\/script><br \/>\n<br \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A current investigation by researchers at Test Level Concord E-mail Safety uncovered a intelligent new phishing rip-off concentrating on companies worldwide. Over the past 14 days, it was discovered that cybercriminals have been abusing Google\u2019s personal automated methods to ship out 1000&#8217;s of malicious emails that look 100% official. How the Assault works In accordance [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":10265,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[5449,361,157,3079,7170,6013,1017,121,7171,261,5491],"class_list":["post-10263","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-breaches","tag-cybersecurity","tag-data","tag-global","tag-googlethemed","tag-hackread","tag-hits","tag-news","tag-organisations","tag-phishing","tag-wave"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/10263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10263"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/10263\/revisions"}],"predecessor-version":[{"id":10264,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/10263\/revisions\/10264"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/10265"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-13 16:26:44 UTC -->