{"id":102133,"date":"2024-10-18T11:21:54","date_gmt":"2024-10-18T18:21:54","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=102133"},"modified":"2024-10-21T11:36:31","modified_gmt":"2024-10-21T18:36:31","slug":"ai-scam-bots-are-trying-to-recover-your-gmail-account","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/","title":{"rendered":"AI scam bots are trying to &#8220;recover&#8221; your Gmail account"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-102137\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-600x400-1.jpg\" alt=\"\" width=\"600\" height=\"400\" \/><\/p>\n<p>Did you get an unexpected alert from Google asking &#8220;Is it you trying to recover your account?&#8221; Or did you receive a phone call that seems to be from a Google call center, claiming there&#8217;s &#8220;suspicious activity&#8221;? You might be the target of an AI-powered account takeover scam.<\/p>\n<p>It&#8217;s hard to believe that we&#8217;re at the point where hackers use AI voice bots to social-engineer people and hack into accounts. And yet, here we are.<\/p>\n<p>Let&#8217;s break down the scam and how it works. Here&#8217;s what you should do now to avoid having your Google or Gmail account hacked.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#isityou\">The &#8220;Is it you\u2026?&#8221; alert on your phone<\/a><\/li>\n<li><a href=\"#voicecall\">The AI-voice phone call and follow-up e-mail<\/a><\/li>\n<li><a href=\"#avoidhacked\">How to avoid getting hacked<\/a><\/li>\n<li><a href=\"#otherscams\">Other scams to watch out for: Apple, sextortion, and fake invoices<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"isityou\"><\/a><\/li>\n<\/ul>\n<h3>The &#8220;Is it you\u2026?&#8221; alert on your phone<\/h3>\n<p>You may have a Google app installed on your phone, such as Gmail. If so, and if someone tries to hack into your Google account, you may get an alert delivered via a push notification, similar to the following:<\/p>\n<blockquote><p><strong>Is it you trying to recover your account?<\/strong><\/p>\n[your Google avatar and Gmail address]\n<p><strong>Device<\/strong><br \/>\nGoogle Support: [alleged support rep&#8217;s name]\n<p><strong>Near<\/strong><br \/>\nCalifornia, USA [or any other location]\n<p><strong>Time<\/strong><br \/>\nJust now<\/p>\n<p>(\u274c No, don&#8217;t allow)\u00a0 (\u2705 Yes, it&#8217;s me)<\/p><\/blockquote>\n<p>No matter what the &#8220;Device&#8221; line says in the alert you received, the source device is definitely not a Google Support representative trying to recover access to your account for you. It&#8217;s always an attacker trying to break into your account (again, unless you personally tried to recover your account at that exact moment).<\/p>\n<p>If you ever get an alert similar to this when you aren&#8217;t expecting it,\u00a0<em><strong>always<\/strong><\/em> click on the &#8220;\u274c No, don&#8217;t allow&#8221; button. Then be sure to follow the steps in the &#8220;How to avoid getting hacked&#8221; section below.<\/p>\n<p>(Note that the push notification will be from the Google or Gmail app itself,\u00a0<em>not<\/em> from an e-mail. If you see something like the above in the body of an e-mail message, don&#8217;t click on anything.)<a name=\"voicecall\"><\/a><\/p>\n<h3>The AI-voice phone call and follow-up e-mail<\/h3>\n<p>In this particular scam, you might also get a follow-up telephone call. It might even look like it comes from a Google phone number\u2014but scammers can easily spoof this.<\/p>\n<p>And it might sound like a real person\u2014in theory, it might be. But in recent attacks, <strong>hackers have been deploying <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/ai\/\">artificial intelligence<\/a> bots with realistic-sounding voices<\/strong> instead. Because they&#8217;re powered by AI, they can plausibly respond to your questions or concerns.<\/p>\n<p>Often, call recipients are skeptical. During the call, the bot may send an e-mail to your Gmail account that, at first glance, might appear legitimate. It may even appear to be sent from an &#8220;@google.com&#8221; address; again, this is spoofable. It might be sent to, or CCed to, an address at &#8220;internalcasetracking(.)com&#8221;\u2014a domain that was registered three months ago, and doesn&#8217;t belong to Google.<\/p>\n<p>Typically, the body of the e-mail refers to an &#8220;Agent&#8221; followed by the name the bot gave you. It often claims, &#8220;Your Case #[8-digit number] for Google Workspace has been updated.&#8221; The e-mail often signs off with &#8220;Thank you for your cooperation&#8221; followed by &#8220;Best regards, Google Account Security Team.&#8221;<\/p>\n<p>This e-mail doesn&#8217;t actually come from Google\u2014even if it looks like it might. In reality, it&#8217;s a scam. If you get such a message, <strong>please use the &#8220;Report phishing&#8221; option<\/strong> in Gmail.<a name=\"avoidhacked\"><\/a><\/p>\n<h3>How to avoid getting hacked<\/h3>\n<p>If you get an &#8220;Is it you\u2026?&#8221; alert like the one above, it&#8217;s critically important to first say &#8220;\u274c No, don&#8217;t allow,&#8221; and then change your password and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-manage-gmail-and-google-security-and-privacy-settings\/\">enable two-step verification for your Google account<\/a>. You should do both via the official Google site linked below. (You shouldn&#8217;t trust any supposed Google links you got via e-mail, text message, or even <a href=\"https:\/\/www.intego.com\/mac-security-blog\/atomic-stealer-amos-mac-malware-spreads-via-malicious-google-ads\/\">Google search results<\/a>.)<\/p>\n<ul>\n<li><a href=\"https:\/\/myaccount.google.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/myaccount.google.com\/<\/a><\/li>\n<\/ul>\n<h4><strong>Why is it important to change your password and enable two-step verification?<\/strong><\/h4>\n<p>Changing your password to something <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\">long, complex, and unique\u2014never used elsewhere<\/a> is crucial to ensure that someone can&#8217;t <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-is-credential-stuffing-why-you-need-unique-passwords\/\">find your password in a data breach<\/a>. And enabling two-step verification (also called <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\">two-factor authentication<\/a>) provides an additional layer of protection for your account.<\/p>\n<p>You might not realize it, but <strong>your e-mail account is one of the ones you need to protect the most.<\/strong> Think about this: most sites offer a &#8220;reset password&#8221; function. How do these typically work? They send you an e-mail with a password reset link. Now imagine what an attacker can do if they get access to your e-mail. It becomes clear that safeguarding your e-mail account should be a high priority for everyone.<a name=\"otherscams\"><\/a><\/p>\n<h3>Other scams to watch out for: Apple, sextortion, and fake invoices<\/h3>\n<p>We&#8217;ve previously covered a number of scams on The Mac Security Blog, including some that have similarities to this one. Common scams you should beware of include the following:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-to-beware-of\/\">Top 10 online scams to beware of: from malvertising to deepfake kidnappings<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/\">How to spot fake Apple security alerts via text, phone, email, or web<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/porn-blackmail-sextortion-emails-have-you-been-hacked-a-new-scam-hello-pervert-pegasus\/\">Porn blackmail \u201csextortion\u201d emails: Has someone hacked you?<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/dont-fall-for-icloud-free-storage-notice-email-scams\/\">Don\u2019t fall for \u201ciCloud FREE Storage Notice\u201d email scams<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-email-scam-targets-blogs-threatening-dmca-takedown-for-illegal-use-of-images\/\">New email scam targets blogs, threatens DMCA takedown claiming illegal image use<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/fake-invoice-scams-norton-mcafee-paypal-and-more\/\">Fake invoice scams: Norton, McAfee, PayPal, and more<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/fake-geek-squad-emails-call-center-scam-leverages-intuit-quickbooks-servers\/\">Fake \u201cGeek Squad\u201d emails: Call center scam leverages Intuit QuickBooks servers<\/a><\/li>\n<\/ul>\n<p><strong>Be sure to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\">sign up for our free e-mail newsletter<\/a><\/strong> to stay up to date on the latest scams and threats to your security and privacy.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>To read more about this AI voice scam, see this <a href=\"https:\/\/x.com\/garrytan\/status\/1844526882592784634\" target=\"_blank\" rel=\"noopener\">X post<\/a> from Garry Tan and deep-dive <a href=\"https:\/\/sammitrovic.com\/infosec\/gmail-account-takeover-super-realistic-ai-scam-call\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a> by Sam Mitrovic.<\/p>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cIs it you trying to recover your account?\u201d Beware; A.I. voice bots are being deployed in this complex Google account hijacking scam to get into your Gmail account.<\/p>\n","protected":false},"author":14,"featured_media":102138,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[3316,59,60,4039,116,2380],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"\u201cIs it you trying to recover your account?\u201d Beware; A.I. voice bots are being deployed in this complex Google account hijacking scam to get into your Gmail account.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI scam bots are trying to &quot;recover&quot; your Gmail account - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"\u201cIs it you trying to recover your account?\u201d Beware; A.I. voice bots are being deployed in this complex Google account hijacking scam to get into your Gmail account.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-18T18:21:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-21T18:36:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Evil android robot pretends to be a Google Support engineer in AI voice call center scam targeting Gmail users\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/\",\"name\":\"AI scam bots are trying to \\\"recover\\\" your Gmail account - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#primaryimage\"},\"datePublished\":\"2024-10-18T18:21:54+00:00\",\"dateModified\":\"2024-10-21T18:36:31+00:00\",\"description\":\"\\u201cIs it you trying to recover your account?\\u201d Beware; A.I. voice bots are being deployed in this complex Google account hijacking scam to get into your Gmail account.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI scam bots are trying to &#8220;recover&#8221; your Gmail account\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"AI scam bots are trying to &#8220;recover&#8221; your Gmail account\",\"datePublished\":\"2024-10-18T18:21:54+00:00\",\"dateModified\":\"2024-10-21T18:36:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#webpage\"},\"wordCount\":1043,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-400x260-1.jpg\",\"keywords\":[\"AI\",\"Gmail\",\"Google\",\"Online Scams\",\"Scam\",\"Support Scam\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"\u201cIs it you trying to recover your account?\u201d Beware; A.I. voice bots are being deployed in this complex Google account hijacking scam to get into your Gmail account.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/","og_locale":"en_US","og_type":"article","og_title":"AI scam bots are trying to \"recover\" your Gmail account - The Mac Security Blog","og_description":"\u201cIs it you trying to recover your account?\u201d Beware; A.I. voice bots are being deployed in this complex Google account hijacking scam to get into your Gmail account.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2024-10-18T18:21:54+00:00","article_modified_time":"2024-10-21T18:36:31+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-400x260-1.jpg","width":400,"height":260,"caption":"Evil android robot pretends to be a Google Support engineer in AI voice call center scam targeting Gmail users"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/","name":"AI scam bots are trying to \"recover\" your Gmail account - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#primaryimage"},"datePublished":"2024-10-18T18:21:54+00:00","dateModified":"2024-10-21T18:36:31+00:00","description":"\u201cIs it you trying to recover your account?\u201d Beware; A.I. voice bots are being deployed in this complex Google account hijacking scam to get into your Gmail account.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"AI scam bots are trying to &#8220;recover&#8221; your Gmail account"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"AI scam bots are trying to &#8220;recover&#8221; your Gmail account","datePublished":"2024-10-18T18:21:54+00:00","dateModified":"2024-10-21T18:36:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#webpage"},"wordCount":1043,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-400x260-1.jpg","keywords":["AI","Gmail","Google","Online Scams","Scam","Support Scam"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ai-scam-bots-are-trying-to-recover-your-gmail-account\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/10\/evil-google-call-center-android-robot-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qzj","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102133"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=102133"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102133\/revisions"}],"predecessor-version":[{"id":102168,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/102133\/revisions\/102168"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/102138"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=102133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=102133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=102133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}