	{"id":103821,"date":"2025-04-24T00:40:14","date_gmt":"2025-04-24T07:40:14","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=103821"},"modified":"2025-04-25T14:57:27","modified_gmt":"2025-04-25T21:57:27","slug":"google-phishing-scam-e-mail-deploys-diabolical-deceptions","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/","title":{"rendered":"Google phishing scam e-mail deploys diabolical deceptions"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-81964\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-movement-tracking.jpeg\" alt=\"Shady phishing emails mimic Google\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-movement-tracking.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-movement-tracking-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-movement-tracking-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>A series of highly sophisticated Google phishing e-mails has been making the rounds in the past couple weeks. The scam combines a number of clever techniques to appear plausibly legitimate to the average person.<\/p>\n<p>Put another way: <em>Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites.<\/em><\/p>\n<p>What are the signs to watch out for? Let&#8217;s break down this scam so you can avoid becoming a victim.<\/p>\n<h3>A subpoena from law enforcement?<\/h3>\n<p>The e-mail subject line is simply, &#8220;Security alert&#8221; \u2014 not very descriptive. The body of the e-mail is quite long, but includes phrasing similar to the following:<\/p>\n<blockquote><p>A subpoena was served on Google LLC requiring us to produce a copy of your Google Account content<\/p>\n<p>&nbsp;<\/p>\n<p>Google Support Ref #: [2 digits, hyphen, 10 digits]\n<p>Transferred to Legal Investigations Support<\/p>\n<p>&nbsp;<\/p>\n<p>Google Support Case:<br \/>\nhttps:\/\/sites.google.com\/u\/[scam URL]\/edit<\/p>\n<p>&nbsp;<\/p>\n<p>Google Account ID: [13-digit number beginning with 17783]\n<p>&nbsp;<\/p>\n<p>This notice is to alert you that a subpoena was issued to Google LLC by a law enforcement that seeks retrieval of information contained in your Google Account.<\/p>\n<p>&nbsp;<\/p>\n<p>To examine the case materials or take measures to submit a protest, please do so in the provided Google Support Case.<\/p><\/blockquote>\n<p>The e-mail is then padded with several blank lines, followed by &#8220;Google Legal Support was granted access to your Google Account.&#8221;<\/p>\n<p>But in reality, no such law enforcement subpoena exists. In fact, it&#8217;s all part of a ruse to encourage you to go to the sites.google.com URL, which is actually a phishing page; we&#8217;ll explain more about that later.<\/p>\n<h3>Scammers exploit Google to send the phishing e-mail<\/h3>\n<p>The most concerning part of this scheme is that the phishers actually trick Google&#8217;s systems into sending the phishing e-mail on their behalf.<\/p>\n<p>Any would-be phisher can buy any domain name, sign up for Google Workspace, and create an app that uses OAuth to allow users to sign in using their Google account. Then they add victims to a mailing list (ideally beginning with &#8220;me@&#8221; so Gmail will show the recipient as &#8220;me&#8221;\u2014mimicking how Gmail would display the e-mail if it were sent to their own individual address).<\/p>\n<p>The name of the scammer&#8217;s OAuth app is ridiculously long; it will be the entire body of the scam e-mail, with line breaks and all, including the phishing link. (We&#8217;ll get back to the phishing page itself in a moment.)<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The first thing to note is that this is a valid, signed email &#8211; it really was sent from no-reply@google.com. It passes the DKIM signature check, and GMail displays it without any warnings &#8211; it even puts it in the same conversation as other, legitimate security alerts. <a href=\"https:\/\/t.co\/GxlFR6ccLG\">pic.twitter.com\/GxlFR6ccLG<\/a><\/p>\n<p>&mdash; nick.eth (@nicksdjohnson) <a href=\"https:\/\/twitter.com\/nicksdjohnson\/status\/1912439027224944676?ref_src=twsrc%5Etfw\">April 16, 2025<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>This isn&#8217;t the first time that we&#8217;ve seen mailing lists used in a similar fashion to mass-send phishing scams through a legitimate service. In February, we previously covered a very similar <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/\">scheme that exploited Microsoft services<\/a>, rather than Google ones.<\/p>\n<p>A big part of the problem is that, by design, a single address can be used as an e-mail distribution list; this makes it possible to send mail to all members of that list at once. But all the big service providers allow external e-mail addresses\u2014for example, victims&#8217; @gmail.com addresses\u2014to be included amongst the members of these lists. This feature, while designed to be helpful, is increasingly being exploited by scammers.<\/p>\n<h3>Google also hosts the phishing scam page<\/h3>\n<p>Yet another diabolical part of the scam is that an authentic Google subdomain hosts the phishing page.<\/p>\n<p>Most people are probably unaware that Google operates a service called Google Sites. This service lets anyone host a Web page under the subdomain sites.google.com. These phishing e-mails use this actual Google subdomain to appear, upon casual inspection, to be a site designed by Google itself rather than a scammer.<\/p>\n<p>If a victim were to visit the sites.google.com address in the phishing e-mail and click on &#8220;View case,&#8221; they would be prompted to sign in to view the supposed support case. But the sign-in form isn&#8217;t real\u2014it&#8217;s designed to steal the victim&#8217;s Google username and password.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">6) If I click &quot;View case&quot; then it shows me this fake signup page. Again, hosted on Google Sites.<\/p>\n<p>Given that it&#39;s not a popular website, I could absolutely see people falling for this<\/p>\n<p>A bunch of things were off:<\/p>\n<p>&#8211; the email wasn&#39;t addressed to me, it was some weird email\u2026 <a href=\"https:\/\/t.co\/VCmaJxJ0vX\">pic.twitter.com\/VCmaJxJ0vX<\/a><\/p>\n<p>&mdash; andrew chen (@andrewchen) <a href=\"https:\/\/twitter.com\/andrewchen\/status\/1911665603112473028?ref_src=twsrc%5Etfw\">April 14, 2025<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>If you receive an e-mail like the one described above, you can try reporting it to Google. If you&#8217;re reading it in Gmail on the Web, click on the three vertical dots (\u22ee) and click &#8220;\ud83e\ude9d Report phishing.&#8221; Or, if you&#8217;re reading it in the Gmail app on your phone, tap on the three horizontal dots (\u2026) closest to the top-right corner of the screen, and tap &#8220;Report spam.&#8221;<\/p>\n<p>It&#8217;s unlikely that Google will actually do anything, even if you report it. After all, Google&#8217;s systems really <em>did<\/em> send the message\u2014and, technically, these Google services are operating as intended. Perhaps, given the number of tech news sites that have begun to report on this scam, someone influential at Google will pay attention and demand some internal changes to minimize the risk of similar attacks in the future.<\/p>\n<p><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We discussed this Google phishing scam in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/reverse-engineering-intego-mac-podcast-episode-393\/\">episode 393<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a>:<\/p>\n<p><iframe style=\"width: 100%; max-width: 660px; overflow: hidden; border-radius: 10px;\" src=\"https:\/\/embed.podcasts.apple.com\/us\/podcast\/episode-393-reverse-engineering\/id1293834627?i=1000704711585\" height=\"175\" frameborder=\"0\" sandbox=\"allow-forms allow-popups allow-same-origin allow-scripts allow-storage-access-by-user-activation allow-top-navigation-by-user-activation\"><\/iframe><\/p>\n<p>Additionally, we&#8217;ve previously covered tons of e-mail and text message <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/scam\/\">scams<\/a>; check out these articles for additional details:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/scammers-using-new-trick-in-phishing-text-messages-google-redirects\/\">Scammers using new trick in phishing text messages: Google redirects<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-inc-sent-you-a-payment-request-payoneer-invoices-other-microsoft-enabled-scams\/\">\u201cApple Inc sent you a payment request\u201d Payoneer invoices; other Microsoft-enabled scams<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/\">How to spot fake Apple security alerts via text, phone, email, or web<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/money-request-and-invoice-scams-via-paypal-venmo-and-docusign\/\">Money request and invoice scams via PayPal, Venmo, and Docusign<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-fake-package-delivery-texts-and-e-mails-heres-what-to-look-for\/\">Beware of fake package delivery texts and e-mails! Here\u2019s what to look for<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/imessage-scams-on-the-rise-tax-refunds-and-toll-payments\/\">iMessage scams on the rise: Tax refunds and toll payments<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/geek-squad-email-scam-sends-fake-invoices-using-housecallpro-servers\/\">Fake \u201cGeek Squad\u201d invoice scam, now using Housecall Pro servers<\/a> (Jan 2024)<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/fake-invoice-scams-norton-mcafee-paypal-and-more\/\">Fake invoice scams: Norton, McAfee, PayPal, and more<\/a> (Jun 2023)<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/top-10-online-scams-to-beware-of\/\">Top 10 online scams to beware of: from malvertising to deepfake kidnappings<\/a><\/li>\n<\/ul>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A highly sophisticated phishing e-mail campaign is exploiting Google\u2019s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here\u2019s what to watch out for so you don\u2019t fall victim to this scam.<\/p>\n","protected":false},"author":14,"featured_media":81973,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[60,4039,116],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A highly sophisticated phishing e-mail campaign is exploiting Google\u2019s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here\u2019s what to watch out for so you don\u2019t fall victim to this scam.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google phishing scam e-mail deploys diabolical deceptions - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A highly sophisticated phishing e-mail campaign is exploiting Google\u2019s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here\u2019s what to watch out for so you don\u2019t fall victim to this scam.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-24T07:40:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T21:57:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-tracking-featured.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-tracking-featured.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-tracking-featured.jpeg\",\"width\":400,\"height\":260,\"caption\":\"Google Lack of Privacy\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/\",\"name\":\"Google phishing scam e-mail deploys diabolical deceptions - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#primaryimage\"},\"datePublished\":\"2025-04-24T07:40:14+00:00\",\"dateModified\":\"2025-04-25T21:57:27+00:00\",\"description\":\"A highly sophisticated phishing e-mail campaign is exploiting Google\\u2019s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here\\u2019s what to watch out for so you don\\u2019t fall victim to this scam.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google phishing scam e-mail deploys diabolical deceptions\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Google phishing scam e-mail deploys diabolical deceptions\",\"datePublished\":\"2025-04-24T07:40:14+00:00\",\"dateModified\":\"2025-04-25T21:57:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#webpage\"},\"wordCount\":1017,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-tracking-featured.jpeg\",\"keywords\":[\"Google\",\"Online Scams\",\"Scam\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A highly sophisticated phishing e-mail campaign is exploiting Google\u2019s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here\u2019s what to watch out for so you don\u2019t fall victim to this scam.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/","og_locale":"en_US","og_type":"article","og_title":"Google phishing scam e-mail deploys diabolical deceptions - The Mac Security Blog","og_description":"A highly sophisticated phishing e-mail campaign is exploiting Google\u2019s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here\u2019s what to watch out for so you don\u2019t fall victim to this scam.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2025-04-24T07:40:14+00:00","article_modified_time":"2025-04-25T21:57:27+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-tracking-featured.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-tracking-featured.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-tracking-featured.jpeg","width":400,"height":260,"caption":"Google Lack of Privacy"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/","name":"Google phishing scam e-mail deploys diabolical deceptions - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#primaryimage"},"datePublished":"2025-04-24T07:40:14+00:00","dateModified":"2025-04-25T21:57:27+00:00","description":"A highly sophisticated phishing e-mail campaign is exploiting Google\u2019s own services; Google itself is sending scam e-mails on behalf of fraudsters, and linking to Google-hosted phishing sites. Here\u2019s what to watch out for so you don\u2019t fall victim to this scam.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Google phishing scam e-mail deploys diabolical deceptions"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Google phishing scam e-mail deploys diabolical deceptions","datePublished":"2025-04-24T07:40:14+00:00","dateModified":"2025-04-25T21:57:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#webpage"},"wordCount":1017,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-tracking-featured.jpeg","keywords":["Google","Online Scams","Scam"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/google-phishing-scam-e-mail-deploys-diabolical-deceptions\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/google-tracking-featured.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-r0x","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103821"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=103821"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103821\/revisions"}],"predecessor-version":[{"id":103861,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103821\/revisions\/103861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/81973"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=103821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=103821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=103821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}