Phishers abuse Google OAuth to spoof Google in DKIM replay attack

Phishers abuse Google OAuth to spoof Google in DKIM replay attack
Summary: A sophisticated phishing attack utilized Google’s infrastructure, allowing hackers to send a convincingly legitimate email that directed victims to a fraudulent support portal to capture their login credentials. The attack cleverly passed Google’s DKIM verification, exploiting a loophole that enabled the malicious email to masquerade as authentic. The incident demonstrates critical vulnerabilities in email authentication systems that can mislead even tech-savvy individuals.

Affected: Google and its users

Keypoints :

  • Hackers sent a fake email that appeared legitimate and passed all verifications, tricking recipients into providing their Google account credentials.
  • The fraudulent email used a Google domain and was cleverly designed to look legitimate, with DKIM authentication making it harder to detect.
  • This phishing attack exploits a weakness in Google’s DKIM checks, which only verify headers and not the envelope, allowing malicious actors to manipulate email delivery.

Source: https://www.bleepingcomputer.com/news/security/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack/