• Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

DigiBanker

Bringing you cutting-edge new technologies and disruptive financial innovations.

  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In
  • Home
  • Pricing
  • Features
    • Overview Of Features
    • Search
    • Favorites
  • Share!
  • Log In

New Gmail hack attack employs an OAuth application and “creative DomainKeys Identified Mail workaround” to fool victims into thinking a security alert email originated from Google itself

April 22, 2025 //  by Finnovate

The latest Gmail hack attack involves a sophisticated phishing campaign that employs the use of an OAuth application and what has been described as a “creative DomainKeys Identified Mail workaround” to fool victims into thinking a security alert email originated from Google itself. In other words, it has managed to bypass the exact protections that Google has put in place to help prevent such attacks in the first place. Google says you have 7 days in which they can undo the damage and regain access to that hacked account. The good news is that Google has confirmed it is putting out updated protections that counter the threat methodology used in this attack. “These protections will soon be fully deployed, which will shut down this avenue for abuse.”  Anyone who finds themselves locked out of their Gmail account following a successful attack, where the hacker has changed their account password and recovery methods, still has seven days in which they can undo the damage and regain access to that hacked account.

Read Article

Category: Members, Cybersecurity, Innovation Topics

Previous Post: « Kojo procurement platform for construction launches AI tool suite to instantly compare pricing across multiple suppliers; forecast material cost changes and availability; identify cost-saving opportunities
Next Post: Interlock ransomware group’s attack tactics evolve from ini tial social engineering involving browser update lures to software updates, masquerading as security products »

Copyright © 2025 Finnovate Research · All Rights Reserved · Privacy Policy
Finnovate Research · Knyvett House · Watermans Business Park · The Causeway Staines · TW18 3BA · United Kingdom · About · Contact Us · Tel: +44-20-3070-0188

We use cookies to provide the best website experience for you. If you continue to use this site we will assume that you are happy with it.OkayPrivacy policy