{"id":55149,"date":"2025-04-27T16:09:08","date_gmt":"2025-04-27T16:09:08","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/55149\/"},"modified":"2025-04-27T16:09:08","modified_gmt":"2025-04-27T16:09:08","slug":"new-gmail-feature-leaves-millions-of-email-users-open-to-attack","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/55149\/","title":{"rendered":"New Gmail Feature Leaves Millions Of Email Users Open To Attack"},"content":{"rendered":"<p class=\"color-body light-text\" role=\"button\">Gmail users warned as new feature brings risk of attack.<\/p>\n<p>NurPhoto via Getty Images <\/p>\n<p>Update, April 27, 2025: This story, originally published April 25, has been updated with new information from security experts concerning Google alert impersonation attacks that target Gmail users and further advice to mitigate the Gmail encryption message threat to users of other email platforms. <\/p>\n<p>Love it or loathe it, with nearly 2 billion users, Google\u2019s Gmail platform cannot be ignored. That\u2019s certainly the case when it comes to hackers, scammers and cybercriminals of all types. They are drawn to the web-based email service like no other. All email platforms are <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/14\/windows-users-given-24-hour-warning-as-attackers-strike\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/14\/windows-users-given-24-hour-warning-as-attackers-strike\/\" target=\"_self\" aria-label=\"targeted by criminals\" rel=\"noopener\">targeted by criminals<\/a>, that\u2019s for sure, but Gmail has the biggest bullseye on its back courtesy of that user base. Sophisticated new Gmail threats are constantly being reported, while Google <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/22\/gmail-attack-update---google-tells-3-billion-users-do-this-next\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/22\/gmail-attack-update---google-tells-3-billion-users-do-this-next\/\" target=\"_self\" aria-label=\"responds with security updates\" rel=\"noopener\">responds with security updates<\/a> to counter them. Some updates that have long been anticipated by eager users could, however, spread the risk of attack beyond just those folks using Gmail. That\u2019s the warning from one leading cybersecurity expert as Google introduces <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/01\/gmail-gets-end-to-end-encryption-from-google-as-21st-birthday-present\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/01\/gmail-gets-end-to-end-encryption-from-google-as-21st-birthday-present\/\" target=\"_self\" aria-label=\"end-to-end encryption for Gmail\" rel=\"noopener\">end-to-end encryption for Gmail<\/a>. Here\u2019s what you need to know.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-10\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/26\/gmail-android-iphone-attacks---fbi-says-do-not-click-anything\/\" target=\"_blank\" aria-label=\"FBI Says Do Not Click Anything As Hack Attacks Strike\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/26\/gmail-android-iphone-attacks---fbi-says-do-not-click-anything\/\">ForbesFBI Says Do Not Click Anything As Hack Attacks StrikeBy Davey Winder<\/a><\/p>\n<p>The Gmail Encryption Attack Threat Explained<\/p>\n<p>Generally speaking, you would not talk about the addition of encryption to a platform as anything other than a blessing for those who value security and privacy. When Google <a class=\"color-link\" href=\"https:\/\/workspace.google.com\/blog\/identity-and-security\/gmail-easy-end-to-end-encryption-all-businesses \" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/workspace.google.com\/blog\/identity-and-security\/gmail-easy-end-to-end-encryption-all-businesses\" aria-label=\"announced\">announced<\/a> that it was bringing end-to-end encryption to all businesses, I was certainly excited, not least because it has been a long time coming. To coincide with the 21st birthday of Gmail, Google said it would be rolling out the ability for enterprise users \u201cto send E2EE messages to any user on any email inbox with just a few clicks.\u201d The process by which this encryption service works involves a kind of protective bubble that surrounds the email in question. So, what\u2019s the issue? Well, if you send such an encrypted email bubble to a Gmail user, then it gets automatically decrypted in their inbox, no problem there. If the recipient isn\u2019t a Gmail user, however, they are presented with an invite to view the email within a restricted version of Gmail, using a Google Workspace guest account.<\/p>\n<p>As J\u00e9r\u00f4me Segura, the senior director of threat intelligence at Malwarebytes, told <a class=\"color-link\" href=\"https:\/\/www.wired.com\/story\/gmail-end-to-end-encryption-scams\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" data-ga-track=\"ExternalLink:https:\/\/www.wired.com\/story\/gmail-end-to-end-encryption-scams\/\" aria-label=\"Wired\">Wired<\/a>, \u201cusers might not yet be familiar with exactly what a legitimate invitation looks like, making them more susceptible to clicking on a fake one.\u201d<\/p>\n<p>We already know how AI-powered phishing attacks are blurring the lines between reality and risk, and you can be sure that scammers will be looking for the best way to create fake invitations within a convincing threat campaign to gain access to the potential victim\u2019s email account credentials.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-8\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/27\/new-security-warning-after-1-billion-windows-users-told-do-not-delete\/\" target=\"_blank\" aria-label=\"New Security Warning After 1 Billion Windows Users Told Do Not Delete\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/27\/new-security-warning-after-1-billion-windows-users-told-do-not-delete\/\">ForbesNew Security Warning After 1 Billion Windows Users Told Do Not DeleteBy Davey Winder<\/a><\/p>\n<p>Google Impersonation Attacks Haunt Gmail Users<\/p>\n<p>It\u2019s not just the addition of the end-to-end encryption feature that could enable malicious actors to attack email users while disguised as genuine Gmail communications. As I recently reported, Google impersonation is rife among those who would use trickery and guile to relieve you of your Gmail account credentials. What has become known as the <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/21\/new-gmail-warning---do-not-open-this-email-from-google\/\" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/21\/new-gmail-warning---do-not-open-this-email-from-google\/\" target=\"_self\" aria-label=\"Gmail Subpoena attack\" rel=\"noopener\">Gmail Subpoena attack<\/a> employed trust in Google\u2019s own protections and platforms, sending a fake security alert from a genuine Google domain to bypass the strict DomainKeys Identified Mail authentication checks employed by Gmail. The email alert was sent from an absolutely legitimate \u201cno-reply@google.com\u201d address. What\u2019s more, Gmail even \u201chelpfully\u201d sorted it into the same conversation that contained other Google security alerts. The scam relied upon the apparent legitimacy of the email along with the sense of urgency and fear created by receiving notification that a supposed subpoena requiring Google to produce a copy of the Gmail account content had been served. The victim was advised that they could examine the subpoena itself or lodge a formal protest. The stinger being, of course, that doing either required them to follow the instructions given and that would lead them to fake Google support pages that, inevitably, would require an account security confirmation and ultimately, dear reader, account compromise.<\/p>\n<p>James Shank, director of threat operations at Expel, warned at the time that there are scaling, performance, and legacy support issues to be taken into account whenever developers design security controls, and that includes the likes of DomainKeys Identified Mail authentication controls. You have to remember that these controls are \u201coptimized for a specific, intended task and should be implemented with the understanding of these constraints,\u201d Shank said. Which means that just because an email message passes DKIM authentication, that is no ironclad guarantee that it is safe. \u201cDKIM validation failure does indicate a problem,\u201d Shank conceded, \u201cbut the inverse, successful DKIM validation, doesn\u2019t necessarily mean the message is benign. \u201c<\/p>\n<p>Whereas the security industry is it seems, always looking for definite signals to determine if something is either good or bad safe or dangerous, secure or insecure, there is a third state as seen with the whole DKIM authentication process. That state, Shank said, is \u201cit\u2019s valid in this very specific way.\u201d It\u2019s critical, therefore, Shank continued, that when determining any action you make sure protection actions are driven with the full context of what the security control states. \u201cIn this case, DKIM won&#8217;t flag the message,\u201d Shank said, \u201cbut other controls responsible for content detection and filtration should still assess the message content.\u201d<\/p>\n<p>Gmail spokesperson Ross Richendrfer told me that Google has now rolled out updated security measures to counter the techniques used by the Gmail Subpoena threat actor in these highly targeted attacks.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-9\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/26\/now-law-enforcement-can-hack-77-of-three-random-word-passwords\/\" target=\"_blank\" aria-label=\"Law Enforcement Can Break 77% Of \u2018Three Random Word\u2019 Passwords\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/26\/now-law-enforcement-can-hack-77-of-three-random-word-passwords\/\">ForbesLaw Enforcement Can Break 77% Of \u2018Three Random Word\u2019 PasswordsBy Davey Winder<\/a><br \/>\nGmail Not Alone In The Genuine Email Domain Attacks<\/p>\n<p>Don\u2019t be fooled into thinking that it\u2019s just Gmail users who are subject to genuine domains being used in email-based attacks, as I <a class=\"color-link\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/02\/23\/new-paypal-warning-hackers-use-genuine-paypal-email-in-ongoing-attack\/ \" data-ga-track=\"InternalLink:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/02\/23\/new-paypal-warning-hackers-use-genuine-paypal-email-in-ongoing-attack\/\" target=\"_self\" aria-label=\"reported\" rel=\"noopener\">reported<\/a> on February 24, PayPal users have been caught out in a very similar way.<\/p>\n<p>Don\u2019t be fooled into thinking that it\u2019s just Gmail users who are subject to genuine domains being used in email-based attacks, as I reported on February 24, PayPal users have been caught out in a very similar way. As I said in the original article, getting an email from someone claiming to be PayPal and suggesting you\u2019ve added a new address to your account and purchased a MacBook M4 might appear to have all the hallmarks of a scam, but when that email originates from a genuine PayPal email domain things are not that clear cut. The phishing emails in question were, you see, sent from a quite genuine and authenticated PayPal email address of service@paypal.com.<\/p>\n<p>In the case of the PayPal attacks, the trick was to use a gift address that had been added to a genuine account in order to generate the email text, to be edited by the attacker at a later date. The email headers in question showed that the emails were sent to a no-reply address and were then being forwarded to a mailing list that contained the addresses of the victims in the sting. Adding a scam address to PayPal generated a confirmation email sent to the address of the threat actor, which was then forwarded to the mailing list.<\/p>\n<p>\u201cPayPal takes seriously our efforts to protect customers from evolving scams and fraud activity, including this common phishing scam,\u201d A PayPal spokesperson said. \u201cWe encourage customers to always remain mindful online and to visit PayPal.com for additional tips on how to protect themselves.\u201d<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-11\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/26\/update-chrome-135-now---mysterious-emergency-security-fix-confirmed\/\" target=\"_blank\" aria-label=\"Google Issues Emergency Chrome Security Update \u2014 Act Now\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/26\/update-chrome-135-now---mysterious-emergency-security-fix-confirmed\/\">ForbesGoogle Issues Emergency Chrome Security Update \u2014 Act NowBy Davey Winder<\/a><br \/>\nGoogle Responds To Gmail Encryption Update Attack Risk Warning<\/p>\n<p>Such phishing attack risks are not, by any means, restricted to Gmail alone. Any email platform is exposed to this kind of attack, with scammers using fraudulent alerts and malicious links to entrap victims. As part of the process to alert users to the potential risk of such threats, Google has even added this warning to the encrypted email invitations that will be sent to non-Gmail users: \u201cBe careful when signing in to view this encrypted message. This message is from an external sender and is encrypted. Make sure you trust the sender and their identity provider before entering your username and password.\u201d<\/p>\n<p>Richendrfer said that the new Gmail end-to-end encryption update has been built from the ground up with this kind of risk firmly in mind. \u201cThe notifications users will receive in this case are very similar to Drive file sharing notifications that go out whenever someone shares a doc or file,\u201d Richendrfer confirmed. \u201cAll the protections we employ to keep scammers from capitalizing on these messages will help us protect this new class of notifications as well,\u201d Richendrfer advised.<\/p>\n<p>Google will never ask for any of your account credentials, Richendrfer concluded, including Gmail account passwords, one-time 2FA passwords or to confirm push notifications.<\/p>\n<p><a class=\"embed-base color-body color-body-border link-embed embed-12\" href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/25\/doge-ransomware-hackers-demand-1-trillion\/\" target=\"_blank\" aria-label=\"DOGE-Trolling Ransomware Hackers Demand $1 Trillion In Bizarre Attack\" rel=\"noopener noreferrer\" data-ga-track=\"forbesEmbedly:https:\/\/www.forbes.com\/sites\/daveywinder\/2025\/04\/25\/doge-ransomware-hackers-demand-1-trillion\/\">ForbesDOGE-Trolling Ransomware Hackers Demand $1 Trillion In Bizarre AttackBy Davey Winder<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Gmail users warned as new feature brings risk of attack. NurPhoto via Getty Images Update, April 27, 2025:&hellip;\n","protected":false},"author":2,"featured_media":51819,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[13509,27811,27812,24779,27809,5592,27810,24780,632,53,16,15],"class_list":{"0":"post-55149","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-cybercrime","9":"tag-email-scam","10":"tag-email-security","11":"tag-gmail-attack","12":"tag-gmail-e2e","13":"tag-gmail-encryption","14":"tag-gmail-scam","15":"tag-gmail-update","16":"tag-gmail-warning","17":"tag-technology","18":"tag-uk","19":"tag-united-kingdom"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114410800361400996","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/55149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=55149"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/55149\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/51819"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=55149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=55149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=55149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}