TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Gmail Account Takeover Phishing Scam Exploiting Salesforce and Google Processes

4 点作者 jimkri6 个月前

1 comment

jimkri6 个月前
I recently investigated a phishing campaign targeting Gmail users that exploits Salesforce infrastructure and Google support processes. The attackers use these trusted platforms to make their phishing emails appear credible and bypass spam filters. Orginal article reporting on the scam: (<a href="https:&#x2F;&#x2F;sammitrovic.com&#x2F;infosec&#x2F;gmail-account-takeover-super-realistic-ai-scam-call&#x2F;" rel="nofollow">https:&#x2F;&#x2F;sammitrovic.com&#x2F;infosec&#x2F;gmail-account-takeover-super...</a>)<p>Key Findings:<p>Exploitation of Salesforce Email Infrastructure: Phishing emails are relayed through Salesforce’s systems, using legitimate headers (e.g., X-SFDC-LK) and passing SPF, DKIM, and DMARC authentication.<p>Abuse of Google Support Processes: Emails impersonate Google Workspace Support (workspacesupport@google.com) and direct victims to attacker-controlled domains. Replies are routed to googlemail@internalcasetracking.com.<p>Social Engineering: Attackers use AI-driven phone calls to enhance the credibility of their phishing attempts.<p>Indicators of Compromise (IoCs): Includes domains, IP addresses, and email addresses associated with the attack.<p>This technique is scalable and can be applied to any Google-based domain, posing a wide-reaching threat.<p>The domain (internalcasetracking.com) used in the attack remains active. I’ve reported the activity to the appropriate security teams and am collaborating with Sam, who originally wrote about this scam.<p>Sharing this here to raise awareness and facilitate further investigation.
评论 #42217339 未加载