Overview
- A phishing campaign exploited Gmail’s DKIM authentication, allowing attackers to send emails that appeared to be from [email protected].
- The emails falsely claimed users were subject to subpoenas and directed them to malicious links disguised as Google support pages.
- Google has implemented interim protections to block the DKIM vulnerability and is finalizing a permanent fix to prevent similar attacks.
- Users are urged to enable passkeys and stronger two-factor authentication methods instead of SMS-based 2FA for enhanced security.
- AI-driven tactics, including voice and email spoofing, are enabling increasingly convincing phishing attempts, highlighting the evolving threat landscape.