Security researchers have discovered a new phishing campaign targeting Gmail users, which is so convincing and highly effective that even tech-savvy people can be tricked into giving away their Google credentials to hackers.

The attackers first compromise a victim’s Gmail account, and once they are in, they start rifling through inboxes to launch secondary attacks in order to pass on the attack.

The hackers first look for an attachment that victims have previously sent to their contacts and a relevant subject from an actual sent email. Then the criminals will start gathering up contact email addresses, who become the new targets of the attackers.

After finding one, the hackers create an image (screenshot) of that attachment and include it in reply to the sender with the same or similar subject for the email, invoking recognition and automatic trust.

What makes this attack so effective is that the phishing emails come from someone the victim knows.

This new Gmail phishing attack uses image attachments that masquerade as a PDF file with a thumbnailed version of the attachment. Once clicked, victims are redirected to phishing pages, which disguise as the Google sign-in page. But it’s a TRAP!

The URL of the fake Gmail login page contains the subdomain, which is enough to fool the majority of people into believing that they are on a legitimate Google page.

Also, since the browser does not show the red warning icon usually used by Google to point out insecure pages, users fall for the Gmail hacking scheme.

Here’s what WordFence CEO Mark Maunder who reported the attacks writes in a blog post:

“This phishing technique uses something called a ‘data URI’ to include a complete file in the browser location bar. When you glance up at the browser location bar and see ‘data:text/html…..’ that is actually a very long string of text.”

“In this [attack] the ‘data:text/html’ and the trusted hostname are the same color. That suggests to our perception that they’re related and the ‘data:text/html’ part either doesn’t matter or can be trusted.”

Victims fall for the scam because of a clever trick employed by this attack, and they submit their credentials, which get delivered directly to the attackers. And as soon as the attackers get their credential, they log into the victim’s Gmail account.
Protecting against this attack is very simple. Gmail users just need to enable two-factor authentication, and, of course, always be careful while opening any attachment in your email.So even if the attackers have access to your credential, they’ll not be able to proceed further without your phone or a USB cryptographic key in order to access your account.


  1. I wanted to draft you that little remark to be able to say thanks a lot the moment again with the magnificent techniques you have provided on this page. This has been really tremendously generous with people like you giving freely exactly what a lot of folks would’ve marketed as an ebook to earn some cash for themselves, certainly now that you might have done it if you ever wanted. The suggestions as well served to become a fantastic way to fully grasp someone else have the same fervor the same as my own to know the truth whole lot more with regards to this condition. I know there are thousands of more fun occasions up front for many who view your blog post.

  2. It was amazing reading this and I feel you’re 100 correct. Inform me if you are considering how to install kodi, that’s my primary competence. I’m hoping to check back with you soon, bye for now!

  3. Many thanks for discussing this info, I bookmarked the website. I’m additionally searching for information about framaroot root, do you know exactly where I might discover one thing such as that? I’ll return in the future!

  4. Fantastic beat ! I wish to apprentice at the same time as you amend your web site, how could i subscribe for a blog web site? The account helped me a applicable deal. I were a little bit acquainted of this your broadcast provided vivid clear idea

  5. It was great reading this info and I feel you are completely correct. Let me know if you’re curious about mobomarket app download, this is my primary competence. I’m hoping to check back with you soon enough, cheers!

  6. Can I just say what a relief to seek out someone who actually knows what theyre speaking about on the internet. You positively know the best way to bring an issue to light and make it important. Extra folks have to learn this and perceive this facet of the story. I cant believe youre no more in style because you positively have the gift.


Please enter your comment!
Please enter your name here