Cybercriminals Abuse Google Cloud Email to Launch Multi-Stage Phishing

Cybercriminals Abuse Google Cloud Email to Launch Multi-Stage Phishing

Cybersecurity researchers have disclosed a sophisticated phishing campaign exploiting Google Cloud's Application Integration service to distribute fraudulent emails across thousands of organizations worldwide.

The attack demonstrates how threat actors are increasingly weaponizing legitimate cloud infrastructure to bypass traditional email security defenses and harvest user credentials at scale.

The campaign, identified by Check Point researchers in December 2025, targeted approximately 3,200 organizations through 9,394 phishing emails over a 14-day period.

Significantly, all messages were sent from the legitimate Google address "," a detail that substantially increased the likelihood of emails reaching recipients' inboxes while evading standard security filters.

Exploitation of Trusted Infrastructure

At the core of this campaign lies the abuse of Google Cloud Application Integration's "Send Email" task—a legitimate automation feature designed to send custom email notifications from integrated workflows. The tool was originally intended to streamline enterprise processes such as system alerts and workflow notifications.

By misusing this functionality, attackers configured the system to send emails to arbitrary recipients directly from Google-owned domains, effectively bypassing traditional authentication protocols like SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance).

This approach represents a fundamental departure from conventional phishing tactics that typically rely on domain spoofing or compromised mail servers. Instead of attacking Google's infrastructure, threat actors exploited the legitimate trust and high sender reputation associated with Google's servers themselves.

Since the emails originated from authentic Google systems, they inherited Google's established credibility and were automatically allowlisted across most organizational email security systems.

Email Design and Initial Deception

The phishing messages were meticulously crafted to mimic routine enterprise notifications, closely replicating Google's visual style and messaging structure. Common lures referenced voicemail alerts, shared file access requests, or permission notifications—routine communications that employees encounter regularly in corporate environments.

Recipients were prompted with action-oriented language such as "View task," "Mark complete," or "Access file," creating a sense of urgency designed to bypass critical thinking.

The sophistication of the emails lay not merely in their authentic appearance but in their contextual plausibility.

Organizations that routinely utilize automated notifications, shared documents, and permission-based workflows found Google-branded alerts particularly convincing, rendering them exceptionally susceptible to the deception.

Multi-Stage Redirection Chain

Upon clicking a malicious link embedded in the phishing email, recipients encountered a carefully orchestrated redirection sequence designed to evade both automated security tools and human scrutiny.

Stage One: The initial link directed users to "storage.cloud.google.com," another trusted Google Cloud service endpoint. This routing leveraged the legitimate Google domain to establish false credibility and lower user suspicion.

Stage Two: Users were subsequently redirected to "googleusercontent.com," where they encountered a fake CAPTCHA or image-based verification interface. This barrier served a dual purpose: it blocked automated security scanners and detection tools from accessing the malicious infrastructure while allowing legitimate users to proceed.

The inclusion of a CAPTCHA validation created an additional psychological reinforcement, convincing users they were interacting with legitimate Google systems rather than malicious infrastructure.

Stage Three: Upon completing the fake verification, users were redirected to a fraudulent Microsoft login page hosted on a non-Microsoft domain.

This final destination represented the credential harvesting endpoint, where attackers captured any login credentials entered by victims.

The multi-stage redirection approach combined trusted cloud infrastructure, user interaction checks, and brand impersonation to maximize attack success while minimizing early detection through static link analysis.

Geographic and Sectoral Distribution

The campaign's geographic reach demonstrated its operational scale and sophistication. The United States accounted for the largest share of affected organizations at 48.6%, followed by Asia-Pacific (20.7%) and Europe (19.8%).

Additional impact was observed in Canada (4.1%), Latin America (3.0%), the Middle East (2.2%), and Africa (0.9%).

Within Latin America, Brazil emerged as the most targeted country with 41% of regional attacks, followed by Mexico at 26%.

Argentina, Colombia, and Chile accounted for 13%, 12%, and 5% of LATAM attacks respectively, underscoring the campaign's broad geographic appetite.

Sectoral targeting revealed a distinct pattern reflecting organizations most reliant on automated workflows and cloud-based communications. Manufacturing organizations represented the primary target sector at 19.6%, followed closely by technology and software-as-a-service firms at 18.9%.

The financial and banking sectors experienced significant impact at 14.8%, while professional services, retail, media, education, healthcare, energy, government, and transportation sectors were also affected, albeit at lower rates.

This sectoral concentration reflected the threat actors' strategic understanding that manufacturing, technology, and finance sectors maintain substantial reliance on automated email notifications, shared documents, and permission-based workflows.

Such organizations therefore found Google-branded notifications inherently credible, dramatically increasing the likelihood of successful credential capture.

Authentication Protocol Circumvention

The campaign's success fundamentally relied on circumventing established email authentication mechanisms that modern organizations typically deploy to prevent spoofing and impersonation attacks.

Because the phishing emails originated from legitimate Google infrastructure rather than forged sources, they passed SPF, DKIM, DMARC, and CompAuth verification checks.

Traditional email security tools that depend primarily on sender reputation and domain authentication were rendered ineffective. Recipients' email servers observed that incoming messages originated from Google's legitimate servers, authenticated properly against Google's published security records, and exhibited no indicators of domain forgery or authentication failure.

Standard reputation-based filtering systems automatically allowlisted the emails, allowing them to bypass quarantine and reach target inboxes with minimal friction.

This represented a critical blind spot in conventional email defense architectures that assume legitimate infrastructure cannot be misused at scale for phishing distribution.

The campaign highlighted the fundamental limitation of authentication protocols that verify the technical legitimacy of email origins without assessing the contextual appropriateness of the message content or sender behavior patterns.

Detection and Response Mechanisms

Security researchers at RavenMail and Check Point identified the campaign through alternative analytical approaches that transcended traditional sender reputation evaluation.

Rather than relying exclusively on authentication protocols or sender credentials, these researchers analyzed behavioral intent and workflow context to detect inconsistencies.

Detection focused on identifying behavioral anomalies such as task assignments originating from external Google addresses, Cloud Storage endpoints incompatible with legitimate Google Tasks operations, and workflow actions inconsistent with normal organizational patterns.

This intent-centric detection approach proved effective where reputation-based systems failed, providing a model for enterprise defense against similar campaigns.

Google responded to the disclosed campaign by implementing protective measures and blocking the identified phishing efforts. The company stated: "We have blocked several phishing campaigns involving the misuse of an email notification feature within Google Cloud Application Integration.

Importantly, this activity stemmed from the abuse of a workflow automation tool, not a compromise of Google's infrastructure. While we have implemented protections to defend users against this specific attack, we encourage continued caution as malicious actors frequently attempt to spoof trusted brands. We are taking additional steps to prevent further misuse."

Implications for Cloud Security Practices

This campaign illustrates a critical vulnerability in modern cloud security paradigms: the tension between operational convenience and security robustness.

Organizations that implement legitimate automation features for business efficiency create potential attack surfaces when threat actors gain unauthorized access to these same automation capabilities or exploit insufficient access controls.

The incident reveals that traditional email security approaches—heavily weighted toward authentication verification and sender reputation assessment—prove inadequate against attacks originating from legitimate infrastructure.

Organizations cannot simply reject emails originating from Google, Microsoft, or other major cloud providers, as legitimate automated notifications constitute essential operational communications.

The campaign's success at scale across diverse geographic regions and industry sectors indicates that similar exploitation patterns will likely persist and evolve.

Threat actors will continue investigating legitimate cloud automation features as viable attack vectors, particularly when these features lack granular access controls, audit logging, or behavioral monitoring.

Effective defense requires transitioning from reputation-based security models toward intent-centric detection systems that analyze workflow legitimacy, contextual appropriateness, and behavioral consistency regardless of sender reputation or authentication protocol compliance.

Organizations must implement advanced email security solutions that inspect content, context, and behavioral patterns rather than solely relying on authentication headers and sender reputation scores.

Furthermore, cloud service providers must implement more restrictive default configurations for automation features, enforce stronger identity verification for unauthorized feature activation, and provide comprehensive audit trails enabling detection of systematic misuse patterns.

The balance between enabling legitimate workflow automation and preventing malicious exploitation represents an ongoing security challenge that transcends the specific campaign documented in this incident.

Kira Sharma - image

Kira Sharma

Kira Sharma is a cybersecurity enthusiast and AI commentator. She brings deep knowledge to the core of the internet, analyzing trends in Cybersecurity & Privacy, the future of Artificial Intelligence, and the evolution of Software & Apps.