MIT Logo

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

Abstract:

A novel phishing attack mechanism delivers malicious emails that pass the DKIM signature check and are sent from the address (no-reply@google.com). Utilizing a DKIM replay attack, the attackers are able bypass standard email security measures and additionally leverage the perceived credibility of a legitimate Google alert. The email presents the target with a falsified narrative regarding a law enforcement subpoena, and directs them through fake Google support steps to extract their information. Google has since implemented updates to shut down this attack vector.

Author:
Ravie Lakshmanan
Year:
2025
Domain:
Dimension:
Region:
Data Type: ,
MIT Political Science
MIT Political Science
ECIR
GSS