New Gmail Feature Leaves Millions Of Email Users Open To Attack

Posted by Davey Winder, Senior Contributor | 4 minutes ago | /consumer-tech, /cybersecurity, /innovation, Consumer Tech, Cybersecurity, Innovation, standard | Views: 1


Update, April 27, 2025: This story, originally published April 25, has been updated with new information from security experts concerning Google alert impersonation attacks that target Gmail users and further advice to mitigate the Gmail encryption message threat to users of other email platforms.

Love it or loathe it, with nearly 2 billion users, Google’s Gmail platform cannot be ignored. That’s certainly the case when it comes to hackers, scammers and cybercriminals of all types. They are drawn to the web-based email service like no other. All email platforms are targeted by criminals, that’s for sure, but Gmail has the biggest bullseye on its back courtesy of that user base. Sophisticated new Gmail threats are constantly being reported, while Google responds with security updates to counter them. Some updates that have long been anticipated by eager users could, however, spread the risk of attack beyond just those folks using Gmail. That’s the warning from one leading cybersecurity expert as Google introduces end-to-end encryption for Gmail. Here’s what you need to know.

ForbesFBI Says Do Not Click Anything As Hack Attacks Strike

The Gmail Encryption Attack Threat Explained

Generally speaking, you would not talk about the addition of encryption to a platform as anything other than a blessing for those who value security and privacy. When Google announced that it was bringing end-to-end encryption to all businesses, I was certainly excited, not least because it has been a long time coming. To coincide with the 21st birthday of Gmail, Google said it would be rolling out the ability for enterprise users “to send E2EE messages to any user on any email inbox with just a few clicks.” The process by which this encryption service works involves a kind of protective bubble that surrounds the email in question. So, what’s the issue? Well, if you send such an encrypted email bubble to a Gmail user, then it gets automatically decrypted in their inbox, no problem there. If the recipient isn’t a Gmail user, however, they are presented with an invite to view the email within a restricted version of Gmail, using a Google Workspace guest account.

As Jérôme Segura, the senior director of threat intelligence at Malwarebytes, told Wired, “users might not yet be familiar with exactly what a legitimate invitation looks like, making them more susceptible to clicking on a fake one.”

We already know how AI-powered phishing attacks are blurring the lines between reality and risk, and you can be sure that scammers will be looking for the best way to create fake invitations within a convincing threat campaign to gain access to the potential victim’s email account credentials.

ForbesNew Security Warning After 1 Billion Windows Users Told Do Not Delete

Google Impersonation Attacks Haunt Gmail Users

It’s not just the addition of the end-to-end encryption feature that could enable malicious actors to attack email users while disguised as genuine Gmail communications. As I recently reported, Google impersonation is rife among those who would use trickery and guile to relieve you of your Gmail account credentials. What has become known as the Gmail Subpoena attack employed trust in Google’s own protections and platforms, sending a fake security alert from a genuine Google domain to bypass the strict DomainKeys Identified Mail authentication checks employed by Gmail. The email alert was sent from an absolutely legitimate “no-reply@google.com” address. What’s more, Gmail even “helpfully” sorted it into the same conversation that contained other Google security alerts. The scam relied upon the apparent legitimacy of the email along with the sense of urgency and fear created by receiving notification that a supposed subpoena requiring Google to produce a copy of the Gmail account content had been served. The victim was advised that they could examine the subpoena itself or lodge a formal protest. The stinger being, of course, that doing either required them to follow the instructions given and that would lead them to fake Google support pages that, inevitably, would require an account security confirmation and ultimately, dear reader, account compromise.

James Shank, director of threat operations at Expel, warned at the time that there are scaling, performance, and legacy support issues to be taken into account whenever developers design security controls, and that includes the likes of DomainKeys Identified Mail authentication controls. You have to remember that these controls are “optimized for a specific, intended task and should be implemented with the understanding of these constraints,” Shank said. Which means that just because an email message passes DKIM authentication, that is no ironclad guarantee that it is safe. “DKIM validation failure does indicate a problem,” Shank conceded, “but the inverse, successful DKIM validation, doesn’t necessarily mean the message is benign. “

Whereas the security industry is it seems, always looking for definite signals to determine if something is either good or bad safe or dangerous, secure or insecure, there is a third state as seen with the whole DKIM authentication process. That state, Shank said, is “it’s valid in this very specific way.” It’s critical, therefore, Shank continued, that when determining any action you make sure protection actions are driven with the full context of what the security control states. “In this case, DKIM won’t flag the message,” Shank said, “but other controls responsible for content detection and filtration should still assess the message content.”

Gmail spokesperson Ross Richendrfer told me that Google has now rolled out updated security measures to counter the techniques used by the Gmail Subpoena threat actor in these highly targeted attacks.

ForbesLaw Enforcement Can Break 77% Of ‘Three Random Word’ Passwords

Gmail Not Alone In The Genuine Email Domain Attacks

Don’t be fooled into thinking that it’s just Gmail users who are subject to genuine domains being used in email-based attacks, as I reported on February 24, PayPal users have been caught out in a very similar way.

Don’t be fooled into thinking that it’s just Gmail users who are subject to genuine domains being used in email-based attacks, as I reported on February 24, PayPal users have been caught out in a very similar way. As I said in the original article, getting an email from someone claiming to be PayPal and suggesting you’ve added a new address to your account and purchased a MacBook M4 might appear to have all the hallmarks of a scam, but when that email originates from a genuine PayPal email domain things are not that clear cut. The phishing emails in question were, you see, sent from a quite genuine and authenticated PayPal email address of service@paypal.com.

In the case of the PayPal attacks, the trick was to use a gift address that had been added to a genuine account in order to generate the email text, to be edited by the attacker at a later date. The email headers in question showed that the emails were sent to a no-reply address and were then being forwarded to a mailing list that contained the addresses of the victims in the sting. Adding a scam address to PayPal generated a confirmation email sent to the address of the threat actor, which was then forwarded to the mailing list.

“PayPal takes seriously our efforts to protect customers from evolving scams and fraud activity, including this common phishing scam,” A PayPal spokesperson said. “We encourage customers to always remain mindful online and to visit PayPal.com for additional tips on how to protect themselves.”

ForbesGoogle Issues Emergency Chrome Security Update — Act Now

Google Responds To Gmail Encryption Update Attack Risk Warning

Such phishing attack risks are not, by any means, restricted to Gmail alone. Any email platform is exposed to this kind of attack, with scammers using fraudulent alerts and malicious links to entrap victims. As part of the process to alert users to the potential risk of such threats, Google has even added this warning to the encrypted email invitations that will be sent to non-Gmail users: “Be careful when signing in to view this encrypted message. This message is from an external sender and is encrypted. Make sure you trust the sender and their identity provider before entering your username and password.”

Richendrfer said that the new Gmail end-to-end encryption update has been built from the ground up with this kind of risk firmly in mind. “The notifications users will receive in this case are very similar to Drive file sharing notifications that go out whenever someone shares a doc or file,” Richendrfer confirmed. “All the protections we employ to keep scammers from capitalizing on these messages will help us protect this new class of notifications as well,” Richendrfer advised.

Google will never ask for any of your account credentials, Richendrfer concluded, including Gmail account passwords, one-time 2FA passwords or to confirm push notifications.

ForbesDOGE-Trolling Ransomware Hackers Demand $1 Trillion In Bizarre Attack



Forbes

Leave a Reply

Your email address will not be published. Required fields are marked *