Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
Cybersecurity researchers have disclosed details of a phishing campaign that involves the attackers impersonating legitimate Google-generated messages by abusing Google Cloud's Application Integration service to distribute emails. The activity, Check Point said, takes advantage of the trust associated with Google Cloud infrastructure to send the messages from a legitimate email address ("
AI Analysis
Technical Summary
This phishing campaign abuses the 'Send Email' task within Google Cloud's Application Integration service, which allows sending custom email notifications from Google-owned domains (e.g., noreply-application-integration@google.com). Attackers leverage this legitimate automation feature to send phishing emails that bypass SPF and DMARC email authentication checks, increasing the likelihood of delivery to user inboxes. The emails mimic authentic Google notifications, such as voicemail alerts or file access permissions, using familiar formatting and language to reduce suspicion. Over a 14-day period in December 2025, attackers sent approximately 9,394 phishing emails targeting around 3,200 organizations worldwide, including European entities. The attack chain involves a multi-stage redirection starting from a link hosted on storage.cloud.google.com, redirecting to googleusercontent.com, where victims encounter a fake CAPTCHA designed to block automated security scanners. After passing this verification, users are directed to a counterfeit Microsoft login page hosted on a non-Microsoft domain, where credential harvesting occurs. The campaign targets sectors that commonly use automated notifications and shared document workflows, such as manufacturing, technology, financial services, professional services, and retail, but also extends to media, education, healthcare, energy, government, travel, and transportation. Google has responded by blocking the misuse of the Application Integration email feature and is implementing additional safeguards to prevent further abuse. This campaign exemplifies how attackers can exploit trusted cloud automation features to conduct large-scale phishing without traditional spoofing techniques.
Potential Impact
For European organizations, this phishing campaign poses a significant risk of credential theft, potentially leading to unauthorized access to corporate systems, data breaches, and subsequent lateral movement within networks. Sectors heavily reliant on Google Cloud services and automated workflows—such as manufacturing, technology, finance, and professional services—are particularly vulnerable. Compromise of credentials could result in financial fraud, intellectual property theft, disruption of operations, and reputational damage. The use of legitimate Google domains to send phishing emails undermines traditional email security controls, increasing the likelihood of successful phishing attempts. Additionally, the multi-stage redirection and CAPTCHA verification reduce detection by automated security tools, increasing the risk of undetected compromise. Given the broad targeting and trusted nature of Google Cloud infrastructure, the campaign could affect a wide range of European organizations, including critical infrastructure and government entities, amplifying potential national security and economic impacts.
Mitigation Recommendations
European organizations should implement advanced email security solutions capable of detecting phishing beyond SPF, DKIM, and DMARC, including heuristic and behavioral analysis to identify suspicious email content and links. Security teams should monitor for unusual email activity originating from legitimate cloud service domains and implement strict policies for handling automated notifications. User awareness training must emphasize the risks of phishing emails appearing to come from trusted cloud providers and the importance of verifying unexpected access requests or notifications. Multi-factor authentication (MFA) should be enforced on all critical systems, especially for cloud services and email accounts, to mitigate credential theft impact. Network defenders should deploy URL rewriting and sandboxing technologies to analyze links in emails before user clicks. Incident response plans should include procedures for rapid identification and containment of phishing incidents involving cloud service impersonation. Organizations should also collaborate with Google and other cloud providers to report abuse and stay informed about emerging threats exploiting cloud automation features.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
Description
Cybersecurity researchers have disclosed details of a phishing campaign that involves the attackers impersonating legitimate Google-generated messages by abusing Google Cloud's Application Integration service to distribute emails. The activity, Check Point said, takes advantage of the trust associated with Google Cloud infrastructure to send the messages from a legitimate email address ("
AI-Powered Analysis
Technical Analysis
This phishing campaign abuses the 'Send Email' task within Google Cloud's Application Integration service, which allows sending custom email notifications from Google-owned domains (e.g., noreply-application-integration@google.com). Attackers leverage this legitimate automation feature to send phishing emails that bypass SPF and DMARC email authentication checks, increasing the likelihood of delivery to user inboxes. The emails mimic authentic Google notifications, such as voicemail alerts or file access permissions, using familiar formatting and language to reduce suspicion. Over a 14-day period in December 2025, attackers sent approximately 9,394 phishing emails targeting around 3,200 organizations worldwide, including European entities. The attack chain involves a multi-stage redirection starting from a link hosted on storage.cloud.google.com, redirecting to googleusercontent.com, where victims encounter a fake CAPTCHA designed to block automated security scanners. After passing this verification, users are directed to a counterfeit Microsoft login page hosted on a non-Microsoft domain, where credential harvesting occurs. The campaign targets sectors that commonly use automated notifications and shared document workflows, such as manufacturing, technology, financial services, professional services, and retail, but also extends to media, education, healthcare, energy, government, travel, and transportation. Google has responded by blocking the misuse of the Application Integration email feature and is implementing additional safeguards to prevent further abuse. This campaign exemplifies how attackers can exploit trusted cloud automation features to conduct large-scale phishing without traditional spoofing techniques.
Potential Impact
For European organizations, this phishing campaign poses a significant risk of credential theft, potentially leading to unauthorized access to corporate systems, data breaches, and subsequent lateral movement within networks. Sectors heavily reliant on Google Cloud services and automated workflows—such as manufacturing, technology, finance, and professional services—are particularly vulnerable. Compromise of credentials could result in financial fraud, intellectual property theft, disruption of operations, and reputational damage. The use of legitimate Google domains to send phishing emails undermines traditional email security controls, increasing the likelihood of successful phishing attempts. Additionally, the multi-stage redirection and CAPTCHA verification reduce detection by automated security tools, increasing the risk of undetected compromise. Given the broad targeting and trusted nature of Google Cloud infrastructure, the campaign could affect a wide range of European organizations, including critical infrastructure and government entities, amplifying potential national security and economic impacts.
Mitigation Recommendations
European organizations should implement advanced email security solutions capable of detecting phishing beyond SPF, DKIM, and DMARC, including heuristic and behavioral analysis to identify suspicious email content and links. Security teams should monitor for unusual email activity originating from legitimate cloud service domains and implement strict policies for handling automated notifications. User awareness training must emphasize the risks of phishing emails appearing to come from trusted cloud providers and the importance of verifying unexpected access requests or notifications. Multi-factor authentication (MFA) should be enforced on all critical systems, especially for cloud services and email accounts, to mitigate credential theft impact. Network defenders should deploy URL rewriting and sandboxing technologies to analyze links in emails before user clicks. Incident response plans should include procedures for rapid identification and containment of phishing incidents involving cloud service impersonation. Organizations should also collaborate with Google and other cloud providers to report abuse and stay informed about emerging threats exploiting cloud automation features.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/cybercriminals-abuse-google-cloud-email.html","fetched":true,"fetchedAt":"2026-01-03T00:18:04.205Z","wordCount":1092}
Threat ID: 6958603ddb813ff03e0a0a57
Added to database: 1/3/2026, 12:18:05 AM
Last enriched: 1/3/2026, 12:18:33 AM
Last updated: 1/8/2026, 6:09:19 AM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing
MediumComplex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks
MediumA phishing campaign with QR codes rendered using an HTML table, (Wed, Jan 7th)
MediumCryptocurrency Scam Emails and Web Pages As We Enter 2026, (Sun, Jan 4th)
MediumPhishing campaign abuses Google Cloud Application to impersonate legitimate Google emails
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.