Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
ENS Founder Flags “Highly Sophisticated” Google-Based Phishing Scam

ENS Founder Flags “Highly Sophisticated” Google-Based Phishing Scam

DeFi PlanetDeFi Planet2025/04/17 20:55
By:DeFi Planet

A new phishing campaign is alarming cybersecurity experts because it exploits Google’s trusted infrastructure.

A new phishing campaign is alarming cybersecurity experts because it exploits Google’s trusted infrastructure.

Nick Johnson, founder of Ethereum Name Service (ENS), alerted users on X about the scam, which successfully bypasses standard email security measures. The attackers have created deceptive emails that resemble genuine Google alerts, even passing authentication checks like DKIM. These fraudulent messages claim that a recipient’s data is under subpoena by law enforcement, making it difficult for users to distinguish them from real security notices.

Victims are lured into clicking a link to “view case materials or protest,” which redirects them to a Google Sites page — a platform often used for building web pages on Google subdomains. This tactic leverages the appearance of authenticity by using Google’s branding and domain to gain user trust. Johnson believes the goal is to steal login credentials, though he refrained from proceeding further into the trap.

According to a recent April 11 report by cybersecurity firm EasyDMARC, the phishing method hinges on the misuse of Google’s services, including Google Sites and OAuth applications. Attackers can freely assign deceptive names to these apps and use a third-party service like Namecheap to send emails with misleading addresses, such as “ [email protected] ,” while setting an arbitrary reply-to email.

The malicious email appears authentic because DKIM validates the message content and headers, but does not validate the actual envelope sender. This allows the phishing email to slip past Gmail’s security layers and into a user’s inbox, even nesting within genuine Google alert threads.

Security experts urge users to remain vigilant, inspect sender details thoroughly, and avoid clicking links from suspicious alerts, regardless of how legitimate they appear.

The incident emerged just as North Korean-linked fraudulent tech workers reportedly expanded their infiltration efforts beyond the United States. According to a separate April 2 report by Google’s Threat Intelligence Group (GTIG), these operatives began targeting blockchain firms in the United Kingdom and Europe.

 

If you want to read more news articles like this, visit DeFi Planet and follow us on Twitter , LinkedIn , Facebook , Instagram , and CoinMarketCap Community.

“Take control of your crypto portfolio with MARKETS PRO, DeFi Planet’s suite of analytics tools.”

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!