Beware of this ceramic fraud in the infiltrated Google


The attackers send e-mail messages to hunt, which seems to be from “No-reply@google.com”, ” It was submitted as an urgent summons procedure About the “law application” search for information from the Google account of the goal. Bleeping computer Reports that the fraud process uses the Google sites application to create realistic photography sites and emails that aim to intimidate the victims to give up their accreditation data.

like Explanation by Easydmarc, E -Email ApprovalEmail messages have been able to bypass the Mail (DKIM) authentication (DKIM) that usually determines fake emails, because they came from the Google tool. The fraudsters simply introduced the full text of the email as a name for their fake application, which controls this text in an email sent by Google to its chosen address.

When redirecting from the deception to the Infrad of the Gmail user, it remains signed and good because the DKIM is achieved only from the message and the heads. PayPal users were targeted with the DKIM Relay attack last month. Finally, it is associated with a realistic support gate on the sites.google.com instead of Accounts.google.com, hoping that the recipient will not receive.

The developer of the automatic name service Nick Johnson received the same Google’s fraud She reported the misuse of the attackers of Google Oauts apps as a safety wood to Google. The company initially cleaned it as “work as intended”, but then it retreated and is now working on repair.

Leave a Reply

Your email address will not be published. Required fields are marked *