Apr 24 2025

How to Send DKIM-Signed, 100% Legit Phishing Emails — Straight from Google That Bypass Everything

Category: Email Security,Information Security,Phishingdisc7 @ 1:01 pm

​A recent revelation by security researcher Nick Johnson highlights a sophisticated phishing technique that exploits Google’s own services—specifically OAuth and Google Sites—to send DKIM-signed phishing emails that appear entirely legitimate. This method allows attackers to craft emails that seem to originate from “no-reply@google.com,” effectively bypassing traditional email security measures and deceiving recipients into divulging sensitive information.​

The attack begins with the creation of a malicious Google OAuth application. Attackers manipulate the app’s name field to include deceptive messages, such as fake security alerts, by inserting numerous spaces or line breaks to obscure the true nature of the content. This crafted app name then autofills into legitimate-looking emails sent by Google, lending an air of authenticity to the phishing attempt.​

Subsequently, the attackers leverage Google Sites to host convincing phishing pages that mimic official Google interfaces. These pages are designed to harvest user credentials under the guise of legitimate Google services. Because the emails are sent through Google’s infrastructure and are DKIM-signed, they often evade spam filters and other security checks, making them particularly dangerous.​

This method is especially concerning because it exploits the inherent trust users place in Google’s services. By utilizing Google’s own platforms to disseminate phishing emails and host malicious content, attackers can effectively bypass many of the safeguards that users and organizations rely on to protect against such threats.​

The implications of this technique are far-reaching. It underscores the need for heightened vigilance and more robust security measures, as traditional defenses like DKIM and SPF may not be sufficient to detect and block such sophisticated attacks. Organizations must recognize that even trusted platforms can be manipulated to serve malicious purposes.​

To counteract these threats, several measures can be implemented:

  • User Education: Regular training to help users recognize phishing attempts, even those that appear to come from trusted sources.​
  • Two-Factor Authentication (2FA): Encouraging or mandating the use of 2FA can add an additional layer of security, making it more difficult for attackers to gain unauthorized access.​
  • Monitoring and Alerts: Implementing systems that monitor for unusual OAuth app creations or sign-in activities can help detect and respond to suspicious behavior promptly.​
  • Email Filtering Enhancements: Updating email filters to scrutinize not just the sender’s address but also the content and context of the message can improve detection rates.​
  • Collaboration with Service Providers: Working closely with platforms like Google to report and address vulnerabilities can lead to quicker resolutions and improved security for all users.​

By adopting a multi-faceted approach that combines user awareness, technical safeguards, and proactive collaboration, organizations can better defend against these advanced phishing techniques.

For further details, access the article here

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: DKIM-Signed

Leave a Reply

You must be logged in to post a comment. Login now.