{"id":53392,"date":"2025-05-13T09:22:41","date_gmt":"2025-05-13T13:22:41","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=53392"},"modified":"2025-05-13T09:22:41","modified_gmt":"2025-05-13T13:22:41","slug":"dkim-replay-attack-through-google-oauth","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/dkim-replay-attack-through-google-oauth\/53392\/","title":{"rendered":"Email from Google: law enforcement is looking into your account"},"content":{"rendered":"<p>Imagine receiving an email that says Google has received a subpoena to release the contents of your account. The email looks perfectly \u201cGoogley\u201d, and the sender\u2019s address appears legitimate too: <strong><em>no-reply@accounts.google.com<\/em><\/strong>. A little unnerving (or maybe panic-inducing?) to say the least, right?<\/p>\n<p>And what luck \u2014 the email contains a link to a Google support page that has all the details about what\u2019s happening. The domain name in the link looks legit, too, and seems to belong to Google\u2026<\/p>\n<p>Regular readers of our blog have probably already guessed that we\u2019re talking here about a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">new phishing scheme<\/a>. And they\u2019d be right. This time, the scammers are exploiting several genuine Google services to fool their victims and make the emails look as convincing as possible. Here\u2019s how it works\u2026<\/p>\n<h2>How phishing email mimics an official Google notification<\/h2>\n<p>The screenshot below shows the email that kicks off the attack; and it does a really credible job of pretending to be an alert from Google\u2019s security system. The message informs the user that the company has received a subpoena requesting access to the data in their Google account.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13091425\/dkim-replay-attack-through-google-oauth-1.jpg\"><img decoding=\"async\" width=\"773\" height=\"1024\" class=\"size-large wp-image-53401\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13091425\/dkim-replay-attack-through-google-oauth-1-773x1024.jpg\"><\/a><\/p>\n<p>The \u201c<strong>from<\/strong>\u201d field contains a genuine Google address: <strong><em>no-reply@accounts.google.com<\/em><\/strong>. This is the exact same address Google\u2019s security notifications come from. The email also contains a few details that reinforce the illusion of authenticity: a Google Account ID, a support ticket number, and a link to the case. And, most importantly, the email tells the recipient that if they want to learn more about the case materials or contest the subpoena, they can do so by clicking a link.<\/p>\n<p>The link itself looks quite plausible, too. The address includes the official Google domain and the support ticket number mentioned above. And it takes a savvy user to spot the catch: Google support pages are located at <strong><em>support.google.com<\/em><\/strong>, but this link leads to <strong><em>sites.google.com<\/em><\/strong> instead. The scammers are, of course, counting on users who either don\u2019t understand such technicalities or don\u2019t notice the word substitution.<\/p>\n<p>If the user isn\u2019t logged in, clicking the link takes them to a genuine Google account login page. After authorizing, they land on a page at <strong><em>sites.google.com<\/em><\/strong>, which quite convincingly mimics the official Google support site.<\/p>\n<div id=\"attachment_53400\" style=\"width: 817px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13091302\/dkim-replay-attack-through-google-oauth-2.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53400\" class=\"size-full wp-image-53400\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13091302\/dkim-replay-attack-through-google-oauth-2.jpg\" alt=\"Fake Google Support page created with Google Sites \" width=\"807\" height=\"533\"><\/a><p id=\"caption-attachment-53400\" class=\"wp-caption-text\">This is what a fake Google Support page linked in the email looks like. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>Now, it just so happens that the <strong><em>sites.google.com<\/em><\/strong> domain belongs to the legitimate <a href=\"https:\/\/en.wikipedia.org\/wiki\/Google_Sites\" target=\"_blank\" rel=\"nofollow noopener\">Google Sites service<\/a>. Launched back in 2008, it\u2019s a fairly unsophisticated website builder \u2014 nothing out of the ordinary. The important nuance about Google Sites is that all websites created within the platform are automatically hosted on a <em>google.com<\/em> subdomain: <strong><em>sites.google.com<\/em><\/strong>.<\/p>\n<p>Attackers can use such an address to both lull victims\u2019 vigilance and circumvent various security systems, as both users and security solutions tend to trust the Google domain. It\u2019s little wonder that scammers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-use-google-search-ads-to-steal-google-ads-accounts\/\" target=\"_blank\" rel=\"nofollow noopener\">have increasingly been using Google Sites to create phishing pages<\/a>.<\/p>\n<h2>Spotting fakes: the devil\u2019s in the (email) details<\/h2>\n<p>We\u2019ve already described the first sign of a dodgy email: the address of the fake support page located at <strong><em>sites.google.com<\/em><\/strong><em>.<\/em> Look to the email header for more red flags:<\/p>\n<div id=\"attachment_53399\" style=\"width: 799px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13091147\/dkim-replay-attack-through-google-oauth-3.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53399\" class=\"size-full wp-image-53399\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13091147\/dkim-replay-attack-through-google-oauth-3.png\" alt='Phishing disguised as an official Google email: note the \"to\" and \"mailed-by\" fields' width=\"789\" height=\"613\"><\/a><p id=\"caption-attachment-53399\" class=\"wp-caption-text\">Spot the fake: look at the \u201cto\u201d and \u201cmailed-by\u201d fields in the header. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The fields to pay attention to are \u201c<strong>from<\/strong>\u201c, \u201c<strong>to<\/strong>\u201c, and \u201c<strong>mailed-by<\/strong>\u201c. The \u201c<strong>from<\/strong>\u201d one seems fine: the sender is the official Google email, <strong><em>no-reply@accounts.google.com<\/em><\/strong>.<\/p>\n<p>But lo and behold, the \u201c<strong>to\u201d<\/strong> field just below it reveals the actual recipient address, and this one sure looks phishy: <strong><em>me[@]googl-mail-smtp-out-198-142-125-38-prod[.]net<\/em><\/strong>. The address is trying hard to imitate some technical Google address, but the typo in the company domain name is a dead giveaway. Moreover, it has absolutely no business being there \u2014 this field is supposed to contain the recipient\u2019s email.<\/p>\n<p>As we keep examining the header, another suspicious address pops up in the \u201c<strong>mailed-by<\/strong>\u201d field. Now, this one is clearly nowhere near Google territory: <strong>fwd-04-1.fwd.privateemail[.]com<\/strong>. Yet again, nonsense like this has no place in an authentic email. For reference, here\u2019s what these fields look like in a real Google security alert:<\/p>\n<div id=\"attachment_53398\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13091041\/dkim-replay-attack-through-google-oauth-4.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53398\" class=\"size-large wp-image-53398\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13091041\/dkim-replay-attack-through-google-oauth-4-1024x563.png\" alt=\"Genuine Google security alert \" width=\"1024\" height=\"563\"><\/a><p id=\"caption-attachment-53398\" class=\"wp-caption-text\">The \u201cto\u201d and \u201cmailed-by\u201d fields in a genuine Google security alert<\/p><\/div>\n<p>Unsurprisingly, these subtle signs would likely be lost on the average user \u2014 especially when they\u2019re already freaked out by the looming legal trouble. Adding to the confusion is the fact that the fake email is actually signed by Google: the \u201c<strong>signed-by<\/strong>\u201d field shows <strong><em>accounts.google.com<\/em><\/strong>. In the next part of this post, we explain how the criminals managed to achieve this, and then we\u2019ll talk about how to avoid becoming a victim.<\/p>\n<h2>Reconstructing the attack step by step<\/h2>\n<p>To figure out exactly how the scammers managed to send such an email and what they were after, <a href=\"https:\/\/easydmarc.com\/blog\/google-spoofed-via-dkim-replay-attack-a-technical-breakdown\/\" target=\"_blank\" rel=\"nofollow noopener\">cybersecurity researchers reenacted the attack<\/a>. Their investigation revealed that the attackers used Namecheap to register the (now-revoked) <strong><em>googl-mail-smtp-out-198-142-125-38-prod[.]net<\/em><\/strong> domain.<\/p>\n<p>Next, they used the same service again to set up a free email account on this domain: <strong>me[@]googl-mail-smtp-out-198-142-125-38-prod[.]net<\/strong>. In addition, the criminals registered a free trial version of Google Workspace on the same domain. After that the scammers registered their own web application in the Google OAuth system, and granted it access to their Google Workspace account.<\/p>\n<p>Google OAuth is a technology that allows third-party web applications to use Google <a href=\"https:\/\/developers.google.com\/identity\/protocols\/oauth2\/web-server\" target=\"_blank\" rel=\"nofollow noopener\">account data to authenticate users<\/a> with their permission. You\u2019ve likely encountered Google OAuth as a way to authenticate for third-party services: it\u2019s the system you use every time you click a \u201cSign in with Google\u201d button. Besides that, applications can use Google OAuth to obtain permission to, for example, save files to your Google Drive.<\/p>\n<p>But let\u2019s get back to our scammers. After a Google OAuth application is registered, the service allows sending a notification to the email address associated with the verified domain. Interestingly enough, the administrator of the web application is free to manually enter any text as the \u201cApp name\u201d \u2014 which seems to be what the criminals exploited.<\/p>\n<p>In the screenshot below, researchers demonstrate this by registering an app with the name \u201cAny Phishing Email Text Inject Here with phishing URLs\u2026\u201d.<\/p>\n<div id=\"attachment_53397\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13090928\/dkim-replay-attack-through-google-oauth-5.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53397\" class=\"size-large wp-image-53397\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13090928\/dkim-replay-attack-through-google-oauth-5-1024x982.jpg\" alt=\"Google OAuth allows setting a completely arbitrary web app name, and scammers are taking advantage of this \" width=\"1024\" height=\"982\"><\/a><p id=\"caption-attachment-53397\" class=\"wp-caption-text\">Registering a web app with an arbitrary name in Google OAuth: the text of a scam email with a phishing link can be entered as a name. <a href=\"https:\/\/easydmarc.com\/blog\/google-spoofed-via-dkim-replay-attack-a-technical-breakdown\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Source<\/a><\/p><\/div>\n<p>Google then sends a security alert containing this phishing text from its official address. This email goes to the scammers\u2019 email address on the domain registered through Namecheap. This service allows forwarding the received notification from Google to any addresses. All they need do is set a specific forwarding rule and specify the email addresses of potential victims.<\/p>\n<div id=\"attachment_53396\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13090811\/dkim-replay-attack-through-google-oauth-6.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-53396\" class=\"size-large wp-image-53396\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2025\/05\/13090811\/dkim-replay-attack-through-google-oauth-6-1024x839.jpg\" alt=\"How scammers set up a forwarding rule to deliver a phishing email that appears like it's coming from Google \" width=\"1024\" height=\"839\"><\/a><p id=\"caption-attachment-53396\" class=\"wp-caption-text\">Setting up a forwarding rule that allows sending the fake email to multiple recipients. <a href=\"https:\/\/easydmarc.com\/blog\/google-spoofed-via-dkim-replay-attack-a-technical-breakdown\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Source<\/a><\/p><\/div>\n<h2>How to protect yourself from phishing attacks like this one<\/h2>\n<p>It\u2019s not entirely clear what the attackers were hoping to achieve with this phishing campaign. Using Google OAuth to authenticate doesn\u2019t mean the victim\u2019s Google account credentials are shared with the scammers. The process generates a token that only provides limited access to the user\u2019s account data \u2014 depending on the permissions the user authorized and the settings configured by the scammers.<\/p>\n<p>The fake Google Support page the deceived user lands on suggested that the goal was to convince them to download some \u201clegal documents\u201d supposedly related to their case. The nature of these documents is unknown, but chances are they contained malicious code.<\/p>\n<p>The researchers reported this phishing campaign to Google. The company <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">acknowledged this as a potential risk<\/a> for users and is currently working on a fix for the OAuth vulnerability. However, how long it will take to resolve the issue remains unknown.<\/p>\n<p>In the meantime, here\u2019s some advice to help you avoid becoming a victim of this and other intricate phishing schemes.<\/p>\n<ul>\n<li>Stay calm if you get an email like this. Begin by carefully examining all the email header fields and comparing them to legitimate emails from Google \u2014 you likely have some in your inbox. If you see any discrepancies, don\u2019t hesitate to hit \u201cDelete\u201d.<\/li>\n<li>Be wary of websites on the <strong><em>google.com<\/em><\/strong> domain that are created with Google Sites. Lately, scammers have been increasingly exploiting it for a wide range of phishing schemes.<\/li>\n<li>As a general rule, avoid clicking links in emails.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/premium?icid=gl_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener nofollow\">robust security solution<\/a>\u00a0that will provide timely warnings about danger and block phishing links.<\/li>\n<\/ul>\n<blockquote><p>Follow the links below to read about five more examples of out-of-the-ordinary phishing.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/turnkey-phishing\/51614\/\" target=\"_blank\" rel=\"noopener nofollow\">Turnkey phishing<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/phishing-with-progressive-web-apps\/51496\/\" target=\"_blank\" rel=\"noopener nofollow\">Progressive phishing: how PWAs can be used to steal passwords<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/browser-in-the-browser-attack\/44163\/\" target=\"_blank\" rel=\"noopener nofollow\">Browser-in-the-browser attack: a new phishing technique<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/beware-github-malicious-links\/51203\/\" target=\"_blank\" rel=\"noopener nofollow\">Malware lurking in \u201cofficial\u201d GitHub and GitLab links<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/when-two-factor-authentication-useless\/51434\/\" target=\"_blank\" rel=\"noopener nofollow\">When two-factor authentication is useless<\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-crypto-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Scammers are exploiting Google services to send fake law enforcement inquiry notifications, making them look like they originate from accounts.google.com.<\/p>\n","protected":false},"author":2726,"featured_media":53393,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[2672,111,19,22,639,76,97,422],"class_list":{"0":"post-53392","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-accounts","9":"tag-attacks","10":"tag-email","11":"tag-google","12":"tag-oauth","13":"tag-phishing","14":"tag-security-2","15":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dkim-replay-attack-through-google-oauth\/53392\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/dkim-replay-attack-through-google-oauth\/28840\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/dkim-replay-attack-through-google-oauth\/24068\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/dkim-replay-attack-through-google-oauth\/28947\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/dkim-replay-attack-through-google-oauth\/28124\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/dkim-replay-attack-through-google-oauth\/30941\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/dkim-replay-attack-through-google-oauth\/29650\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/dkim-replay-attack-through-google-oauth\/39506\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/dkim-replay-attack-through-google-oauth\/13355\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/dkim-replay-attack-through-google-oauth\/22778\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/dkim-replay-attack-through-google-oauth\/23806\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/dkim-replay-attack-through-google-oauth\/29114\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dkim-replay-attack-through-google-oauth\/34889\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dkim-replay-attack-through-google-oauth\/34522\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=53392"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53392\/revisions"}],"predecessor-version":[{"id":53403,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/53392\/revisions\/53403"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/53393"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=53392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=53392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=53392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}