<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Email Security &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/email-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Fri, 17 Apr 2026 06:08:52 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Email Security &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>n8n Webhook Malware: Hackers Exploit Automation to Spread Attacks</title>
		<link>https://firsthackersnews.com/n8n-webhook-malware-attack/</link>
					<comments>https://firsthackersnews.com/n8n-webhook-malware-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 05:48:17 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AutomationSecurity]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#n8n]]></category>
		<category><![CDATA[#phishing]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[#WebhookAttack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11602</guid>

					<description><![CDATA[<p>A new cyberattack campaign is exploiting trusted automation platforms like n8n to deliver malware and track users in</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/n8n-webhook-malware-attack/">n8n Webhook Malware: Hackers Exploit Automation to Spread Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A new cyberattack campaign is exploiting trusted automation platforms like n8n to deliver malware and track users in a much more subtle way. Instead of relying on traditional malicious infrastructure, attackers are hiding their activity inside legitimate services—making detection far more difficult.</p>



<p>Between October 2025 and March 2026, security analysts observed a significant spike in phishing campaigns leveraging webhook functionality. These attacks take advantage of how automation tools are designed to connect apps and process real-time data, effectively turning a business productivity feature into a delivery channel for cyber threats.</p>



<h2 class="wp-block-heading">How the Attack Works</h2>



<p>Platforms like n8n and Zapier use webhooks to trigger workflows when a user interacts with a specific URL. Attackers are now embedding these webhook URLs into phishing emails, often disguising them as trusted services like file-sharing links.</p>



<p>When a victim clicks the link, the webhook triggers a workflow that dynamically serves content based on the user’s system or browser data. This makes the attack highly adaptive and harder to detect.</p>



<p>In many observed cases, users are redirected to fake pages that mimic services such as cloud storage platforms. These pages may include CAPTCHA-style verification to appear legitimate. Once the user interacts, a malicious file is downloaded—often disguised as a document or installer.</p>



<ul class="wp-block-list">
<li>Attackers use trusted webhook URLs to bypass security filters</li>



<li>Payloads are dynamically tailored based on victim device data</li>
</ul>



<h2 class="wp-block-heading">Advanced Techniques and Impact</h2>



<p>Research from Cisco Talos shows that attackers are not just delivering malware—they are also using these workflows to collect valuable data about their targets.</p>



<p>Some campaigns install remote monitoring tools that give attackers persistent access to infected systems. Others use tracking techniques, such as invisible pixels in emails, to monitor when messages are opened and gather device-level information.</p>



<p>Because the traffic originates from legitimate platforms, it blends into normal network activity. This makes it much harder for traditional security tools to flag or block the attack.</p>



<p>This campaign highlights a major shift in cyber threats. Instead of breaking into systems directly, attackers are abusing trusted tools that organizations rely on every day. As automation and AI-driven workflows become more common, they also introduce new risks that defenders must account for.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/n8n-webhook-malware-attack/">n8n Webhook Malware: Hackers Exploit Automation to Spread Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/n8n-webhook-malware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fake LastPass Support Scam Targets Password Vaults</title>
		<link>https://firsthackersnews.com/lastpass-support-phishing-attack/</link>
					<comments>https://firsthackersnews.com/lastpass-support-phishing-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 06:05:07 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybercriminals]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#AccountSecurity]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#LastPass]]></category>
		<category><![CDATA[#LastPassPhishing]]></category>
		<category><![CDATA[#PasswordManager]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11335</guid>

					<description><![CDATA[<p>A new phishing campaign is pretending to be LastPass support emails to trick users into revealing their vault</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lastpass-support-phishing-attack/">Fake LastPass Support Scam Targets Password Vaults</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p></p>



<p>A new phishing campaign is pretending to be <strong>LastPass support emails</strong> to trick users into revealing their vault passwords and account credentials.</p>



<p>Attackers send emails that look like internal support conversations about suspicious activity on a user’s account.</p>



<p>These messages claim that someone is attempting actions such as:</p>



<ul class="wp-block-list">
<li>Exporting vault data</li>



<li>Recovering the account</li>



<li>Registering a new trusted device</li>
</ul>



<p>The goal is to scare users into reacting quickly.</p>



<h2 class="wp-block-heading">How the Phishing Attack Works</h2>



<p>Hackers use a method called <strong>display name spoofing</strong>. The sender name appears as <em>LastPass Support</em>, but the actual email address comes from a different domain.</p>



<p>Many email apps, especially on mobile devices, show only the sender name. Because of this, users may not notice the fake address.</p>



<p>The email then asks users to secure or verify their account by clicking a link.</p>



<p>However, the link leads to a malicious website such as:</p>



<p>verify-lastpass[.]com</p>



<p>This site hosts a fake <strong>LastPass login page</strong> designed to look identical to the official one. If users enter their credentials, attackers can capture their master password and access their stored vault data.</p>



<h2 class="wp-block-heading">Common Phishing Email Signs</h2>



<p>The phishing emails often include LastPass branding and fake message threads to appear legitimate.</p>



<p>Some of the subject lines used include:</p>



<ul class="wp-block-list">
<li>“Account recovery verification request”</li>



<li>“Unauthorized vault export attempt detected”</li>



<li>“New trusted device registered to your account”</li>
</ul>



<p>These messages create urgency so users click before verifying the source.</p>



<h2 class="wp-block-heading">Security Advice for LastPass Users</h2>



<p>LastPass has warned that it will <strong>never ask for a user’s master password</strong> through email.</p>



<p>Users should take the following precautions:</p>



<ul class="wp-block-list">
<li>Check the full sender email address carefully</li>



<li>Avoid clicking links inside emails</li>



<li>Access LastPass directly through the official website or app</li>



<li>Enable multi-factor authentication (MFA)</li>



<li>Report suspicious emails to <strong><a>abuse@lastpass.com</a></strong></li>
</ul>



<h2 class="wp-block-heading">Why This Attack Matters</h2>



<p>Phishing attacks are becoming more realistic and harder to detect.</p>



<p>Since password managers store sensitive data, they are a high-value target for cybercriminals. Users should always verify security alerts and avoid rushing to click links, even when the message appears legitimate.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/lastpass-support-phishing-attack/">Fake LastPass Support Scam Targets Password Vaults</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/lastpass-support-phishing-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OAuth Phishing Campaign Targets Entra ID and Google Workspace</title>
		<link>https://firsthackersnews.com/oauth-phishing-campaign-targets-entra-id-and-google-workspace/</link>
					<comments>https://firsthackersnews.com/oauth-phishing-campaign-targets-entra-id-and-google-workspace/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 12:23:09 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#AccountTakeover]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberRisk]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberSecurityNews]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DigitalSecurity]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#EntraID]]></category>
		<category><![CDATA[#GoogleWorkspace]]></category>
		<category><![CDATA[#IdentitySecurity]]></category>
		<category><![CDATA[#IdentityThreats]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#InfosecCommunity]]></category>
		<category><![CDATA[#MicrosoftEntraID]]></category>
		<category><![CDATA[#OAuth]]></category>
		<category><![CDATA[#OAuthAttack]]></category>
		<category><![CDATA[#OAuthPhishing]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SecurityOperations]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11327</guid>

					<description><![CDATA[<p>Microsoft has discovered advanced phishing campaigns that misuse the normal behavior of the OAuth 2.0 authentication process. Instead</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/oauth-phishing-campaign-targets-entra-id-and-google-workspace/">OAuth Phishing Campaign Targets Entra ID and Google Workspace</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft has discovered advanced phishing campaigns that misuse the normal behavior of the OAuth 2.0 authentication process.</p>



<p>Instead of exploiting software bugs or directly stealing passwords, attackers abuse trusted login flows used by platforms like Microsoft Entra ID and Google Workspace. This tactic allows them to bypass traditional email security systems and quietly redirect victims to malicious sites.</p>



<h2 class="wp-block-heading"><strong>How the Attack Starts</strong></h2>



<p>The attack begins when threat actors create a malicious application inside their own cloud tenant. They configure the application&#8217;s redirect link to point to a domain controlled by the attackers.</p>



<figure class="wp-block-image size-full is-resized"><img fetchpriority="high" decoding="async" width="759" height="881" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-3.png" alt="" class="wp-image-11328" style="width:705px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-3-258x300.png 258w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-3.png 759w" sizes="(max-width: 759px) 100vw, 759px" /><figcaption class="wp-element-caption">attack chain(Source: Microsoft)<br></figcaption></figure>



<p>To lure victims, attackers send phishing emails that appear legitimate. These messages often look like normal workplace requests.</p>



<p>Common phishing lures include:</p>



<ul class="wp-block-list">
<li>Fake e-signature requests</li>



<li>Microsoft Teams meeting invitations</li>



<li>Password reset alerts</li>



<li>Account verification messages</li>
</ul>



<p>When a victim clicks the link, a hidden OAuth authorization process begins.</p>



<h2 class="wp-block-heading"><strong>How Attackers Bypass Detection</strong></h2>



<p>Attackers modify certain parameters in the OAuth request to trigger a silent authentication process.</p>



<p>Two parameters are commonly abused:</p>



<ul class="wp-block-list">
<li><strong>prompt=none</strong> – forces the system to check the session without user interaction</li>



<li><strong>scope=invalid</strong> – intentionally triggers an authentication error</li>
</ul>



<p>This forces the identity provider to redirect the user automatically. Because the redirection happens through a trusted identity provider, the link looks legitimate to users and security tools.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>



<h2 class="wp-block-heading"><strong>Using the “State” Parameter for Deception</strong></h2>



<p>To make the attack look even more convincing, attackers abuse the OAuth <strong>state</strong> parameter.</p>



<p>Normally, this parameter is used to match authentication requests and responses. However, attackers encode the victim’s email address inside it.</p>



<p>Encoding methods used include:</p>



<ul class="wp-block-list">
<li>Base64</li>



<li>Hex encoding</li>



<li>Custom decoding schemes</li>
</ul>



<p>When the victim lands on the phishing page, their email address is already filled in automatically, making the login page appear legitimate.</p>



<h2 class="wp-block-heading"><strong>What Happens After Redirection</strong></h2>



<p>Once redirected, victims are sent to attacker-controlled infrastructure.</p>



<p>Two main outcomes have been observed:</p>



<h3 class="wp-block-heading"><strong>Credential Theft</strong></h3>



<p>Victims are redirected to phishing frameworks such as EvilProxy that capture login credentials and session cookies.</p>



<h3 class="wp-block-heading"><strong>Malware Delivery</strong></h3>



<p>In some campaigns, the redirect automatically downloads a ZIP file. This archive contains a malicious shortcut that launches a PowerShell script.</p>



<p>The script performs several actions:</p>



<ul class="wp-block-list">
<li>Collects system information</li>



<li>Extracts a legitimate executable file (steam_monitor.exe)</li>



<li>Loads a malicious DLL (crashhandler.dll)</li>
</ul>



<p>This technique allows attackers to run malicious code while appearing as legitimate software, ultimately connecting the infected system to an external command-and-control server.</p>



<h2 class="wp-block-heading"><strong>Mitigation and Threat Indicators</strong></h2>



<p>This attack shows how threat actors can misuse normal OAuth authentication behavior instead of exploiting software bugs. Because the activity follows standard protocol rules, it can be harder for traditional security tools to detect.</p>



<p><strong>Key Mitigation Steps</strong></p>



<ul class="wp-block-list">
<li>Restrict user consent for third-party OAuth applications</li>



<li>Regularly audit apps with excessive permissions</li>



<li>Implement Conditional Access policies</li>



<li>Enable strong identity protection controls</li>



<li>Use XDR to monitor identity, email, and endpoint activity</li>



<li>Monitor OAuth URL clicks with invalid <strong>scope</strong> parameters</li>



<li>Watch for unusual downloads triggered after OAuth redirects</li>



<li>Investigate suspicious <strong>PowerShell executions</strong></li>



<li>Detect unexpected <strong>DLL side-loading activit</strong></li>
</ul>



<h2 class="wp-block-heading"><strong>IOCs</strong></h2>



<figure class="wp-block-table"><table><thead><tr><th>Detection Type</th><th>Indicator / Component Details</th><th>Context</th></tr></thead><tbody><tr><td><strong>URL Parameters</strong></td><td><code>prompt=none</code>,&nbsp;<code>scope=invalid</code>&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/"></a>​</td><td>Used to trigger silent authentication errors&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/"></a>​.</td></tr><tr><td><strong>File Artifacts</strong></td><td><code>steam_monitor.exe</code>,&nbsp;<code>crashhandler.dll</code>,&nbsp;<code>crashlog.dat</code>&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/"></a>​</td><td>Components used for malicious DLL side-loading&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/"></a>​.</td></tr><tr><td><strong>Defender Antivirus</strong></td><td>Trojan:Win32/Malgent, Trojan:Win32/Znyonm, Trojan:Win32/WinLNK&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/"></a>​</td><td>Defender signatures for the associated malware payloads&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/"></a>​.</td></tr><tr><td><strong>Error Codes</strong></td><td>Error 65001,&nbsp;<code>error=interaction_required</code>&nbsp;<a rel="noreferrer noopener" target="_blank" href="https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/"></a>​</td><td>Indicates failed silent SSO and successful redirect&nbsp;<a href="https://www.microsoft.com/en-us/security/blog/2026/03/02/oauth-redirection-abuse-enables-phishing-malware-delivery/" target="_blank" rel="noreferrer noopener"></a>​.</td></tr></tbody></table></figure>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/oauth-phishing-campaign-targets-entra-id-and-google-workspace/">OAuth Phishing Campaign Targets Entra ID and Google Workspace</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/oauth-phishing-campaign-targets-entra-id-and-google-workspace/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GTFire Phishing Attack Hides Behind Google Services</title>
		<link>https://firsthackersnews.com/gtfire-google-phishing-campaign/</link>
					<comments>https://firsthackersnews.com/gtfire-google-phishing-campaign/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 02 Mar 2026 21:45:10 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cyber threat]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#BrandImpersonation]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#CredentialTheft]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DigitalRisk]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#GoogleAbuse]]></category>
		<category><![CDATA[#GTFire]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#PhishingCampaign]]></category>
		<category><![CDATA[#SecurityAwareness]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11311</guid>

					<description><![CDATA[<p>GTFire is a newly identified phishing campaign that misuses trusted Google services, including Firebase and Google Translate, to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gtfire-google-phishing-campaign/">GTFire Phishing Attack Hides Behind Google Services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>GTFire is a newly identified phishing campaign that misuses trusted Google services, including Firebase and Google Translate, to steal user credentials.</p>



<p>By hosting phishing content on legitimate Google-owned domains, the attackers are able to bypass many email security filters and web gateways. Because the links appear trustworthy, they are less likely to raise suspicion.</p>



<p>Victims are redirected to realistic login pages that imitate well-known brands. After entering their credentials, they are quietly sent to the real website, making the attack difficult to detect.</p>



<h2 class="wp-block-heading"><strong>Global Impact and Scale</strong></h2>



<p>The campaign is widespread. Investigators uncovered attacker-controlled servers containing thousands of stolen credentials linked to more than 1,000 organizations across 100+ countries and over 200 industries.</p>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="608" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-1024x608.png" alt="" class="wp-image-11312" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-300x178.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-768x456.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-1024x608.png 1024w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-1-1536x912.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">GTFire phishing campaign (Source: Group-IB)<br></figcaption></figure>



<p>Mexico has the highest number of confirmed victims, particularly in manufacturing, education, and government sectors. The United States, Spain, India, and Argentina are also significantly affected.</p>



<p>The use of trusted cloud services makes this campaign especially effective and harder to block using traditional security controls.</p>



<p>Group-IB researchers describe GTFire as a structured, large-scale credential theft operation.</p>



<p>Attackers reuse the same phishing templates across multiple brands and store stolen data on centralized servers, organized by date, language, and targeted servic</p>



<p>More than 120 phishing domains were discovered, using similar naming patterns to quickly rotate infrastructure and avoid detection.</p>



<p>Attackers customize each fake login page to closely match real brands. After victims enter their credentials, they are redirected to the legitimate website, delaying suspicion.</p>



<p>Because the campaign uses trusted Google domains, traditional URL filtering and blocklists struggle to detect it — showing how easily legitimate infrastructure can be misused for phishing.</p>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>The attack starts with a phishing email that contains a Google Translate link. This link quietly routes the victim through Google’s translation service before redirecting them to a fake login page hosted on Firebase.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="624" height="571" src="https://firsthackersnews.com/wp-content/uploads/2026/03/image-2.png" alt="" class="wp-image-11313" style="width:931px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2026/03/image-2-300x275.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/03/image-2.png 624w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption">Phishing pages display fake login error messages (Source: Group-IB)<br><br></figcaption></figure>



<p>Because the link uses a Google domain, many email filters and web gateways do not block it.</p>



<p>Attackers create many random *.web.app subdomains to host phishing pages and rotate them frequently to avoid detection. Each page is designed to look like a real brand login portal.</p>



<p>When victims enter their credentials, they are shown a fake “wrong password” message and asked to try again. Both login attempts are secretly captured and sent to attacker-controlled servers, along with basic details like location and browser language.</p>



<p>The stolen data is collected using simple, ready-made backend tools, making the campaign easy to scale.</p>



<h2 class="wp-block-heading"><strong>Mitigation Measures</strong></h2>



<p>Organizations should:</p>



<ul class="wp-block-list">
<li>Enforce phishing-resistant multi-factor authentication (MFA)</li>



<li>Train employees to recognize suspicious Google-based links</li>



<li>Monitor for unusual use of translate.goog and *.web.app domains</li>



<li>Watch for brand impersonation hosted on trusted cloud platforms</li>



<li>Share indicators of compromise with security communities and CERT teams</li>
</ul>



<p>Trusted services can be misused, so detection strategies must go beyond basic domain reputation check</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gtfire-google-phishing-campaign/">GTFire Phishing Attack Hides Behind Google Services</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/gtfire-google-phishing-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
