Severity
High
Analysis Summary
Researchers have uncovered a sophisticated phishing campaign that impersonates Google support to steal user credentials, combining vishing, spoofed domains, and Google’s trusted infrastructure. The attackers initiate contact via phone calls, using voice-spoofing technology to mimic Google representatives and create urgency by citing suspicious account activity or security concerns. This multi-layered social engineering approach has proven highly effective, targeting organizations globally across the United States, Europe, Asia-Pacific, Canada, and Latin America.
The campaign cleverly bypasses traditional email authentication mechanisms such as SPF, DKIM, and DMARC by sending phishing emails through Google Cloud Application Integration services. Instead of relying on easily detectable fake domains, attackers leverage legitimate Google infrastructure to distribute their emails, making detection through conventional security filters challenging. In December 2025 alone, over 9,000 phishing emails were recorded, targeting approximately 3,200 businesses worldwide.
Victims who click on embedded links are led through a sophisticated redirection chain to pages hosted on trusted Google Cloud Storage domains. According to the Researcher, these pages often display fake CAPTCHA verification screens that block automated security scanners while allowing human users to proceed. After passing the CAPTCHA, users are redirected to credential-harvesting sites mimicking Google login screens or Microsoft 365 portals, where attackers collect usernames and passwords. This tactic effectively weaponizes legitimate cloud infrastructure, highlighting a shift in phishing strategies from domain spoofing to abusing trusted platforms.
Security experts recommend several mitigation strategies to counter this threat. Users should never click on links from unsolicited communications and should access service portals directly. Organizations are advised to implement multi-factor authentication (MFA), use password managers, restrict login locations by IP range, and provide regular cybersecurity awareness training. Additionally, behavioral analysis and contextual threat detection should supplement traditional domain-reputation defenses to identify malicious activity even when legitimate infrastructure is exploited. This campaign underscores the need to rethink email security strategies as attackers increasingly leverage trusted platforms for phishing attacks.
Impact
- Gain Access
Remediation
- Never click on unsolicited links – Always access service portals directly through official URLs.
- Implement Multi-Factor Authentication (MFA) – Require an additional verification step to reduce the impact of stolen credentials.
- Use a password manager – Ensure strong, unique passwords for each account and reduce credential reuse.
- Restrict login locations – Limit access by IP range or geolocation to reduce unauthorized access risk.
- Conduct regular security awareness training – Educate employees on vishing, phishing tactics, and social engineering attacks.
- Deploy behavioral analysis and contextual threat detection – Monitor for unusual login patterns or suspicious user behavior, even from legitimate domains.
- Update and enforce email security policies – Apply SPF, DKIM, and DMARC, and monitor for anomalies despite attackers abusing trusted infrastructure.
- Perform regular phishing simulations – Test employee awareness and improve response to social engineering attempts.
- Monitor cloud infrastructure usage – Track unusual activity in cloud services to detect potential misuse of trusted platforms.


