Google has issued an urgent alert about a dangerous new Gmail phishing scam that exploits their own infrastructure to bypass security. The sophisticated attack uses fake subpoena notifications and AI-generated content to trick even tech-savvy users. Over 3 billion Gmail accounts are at risk, with attackers gaining full access to victims’ emails, files, and Google services within just 7 days of clicking malicious links. The technical details of this attack reveal an unsettling level of criminal innovation.

As hackers grow increasingly crafty, a dangerous new Gmail phishing scam is wreaking havoc worldwide. The attack is so sophisticated that even tech-savvy security researchers are falling for it. No joke – these scammers have figured out how to exploit Google’s own infrastructure against itself. The scam relies on subpoena notifications that create a false sense of urgency.
The scheme works by manipulating Google’s OAuth system and DKIM authentication, allowing attackers to send emails that look exactly like they’re from “[email protected].” And we mean exactly. These messages sail right through Gmail’s security checks because technically, they’re using Google’s legitimate systems. Pretty clever, if they weren’t using it for evil. Users are strongly advised to enable two-factor authentication as a crucial defense against these attacks.
Hackers exploit Google’s own security tools to send flawless fake emails, bypassing spam filters through OAuth and DKIM manipulation.
The scam has put over 3 billion Gmail accounts at risk, with 7.5 million Australians already targeted. When users receive these perfectly-spoofed messages, they’re directed to fake Google support pages – hosted on actual Google Sites, making them nearly impossible to distinguish from the real thing. The attackers even use AI to generate convincing emails and phone calls that sound official.
What makes this attack particularly nasty is its use of urgency tactics. Messages often reference legal threats or subpoenas to panic users into clicking malicious links. And once someone falls for it? Their account can be completely hijacked within seven days. The attackers gain full access to emails, files, and connected Google services. Thanks to stolen OAuth tokens, they can maintain unauthorized access even after password changes.
The technical sophistication of these attacks is remarkable. They’re using Google’s own DKIM signatures to legitimize harmful emails, embedding malicious code in Google Sites, and creating phishing pages that could fool even the most careful users.
Traditional spam filters are useless against these attacks because they’re technically “legitimate” emails using Google’s infrastructure. The dark web has made these phishing toolkits widely available, turning what was once a sophisticated hack into a point-and-click operation for criminals worldwide.
And with both businesses and individuals in the crosshairs, no Gmail user is truly safe from these increasingly convincing scams.