Hot topics

Gmail Users Beware: Even Developers Are Falling for This Scam

Gmail users warned sophisticated scam fake website
© Gemini for nextpit

Read in other languages:

The popularity of Gmail and its integration with a growing number of apps and websites has become a goldmine for hackers. As new safeguards are continually added to the system, attacks are also becoming increasingly sophisticated. A new phishing scheme designed to steal sensitive information is now targeting Gmail users, and even developers have been fooled by it. Here's how to spot the threat and protect yourself.

It is not unusual for Google to issue warnings about rising threats, including new types of scams and phishing tactics. This latest case follows a similar pattern, using weaponized websites that are increasingly difficult to detect.

Gmail Phishing Disguised as a Voicemail Alert

According to a report published by malwr-analysis, Gmail users are being targeted by a new phishing attack. The scheme begins with an email labeled “New Voice Notification,” sent from a spoofed sender. Notably, the phishing campaign uses Microsoft’s Dynamics platform to bypass email filters and anti-spam protections.

Inside the email, there is a button prompting users to open the voicemail on a separate website. This site features a fake CAPTCHA security prompt that victims must complete to proceed. The CAPTCHA is part of a broader mechanism designed to make the page appear legitimate and earn the user’s trust.

Once the CAPTCHA is completed, the victim is redirected to a cloned Gmail login page where they are prompted to enter their account credentials. The interface closely resembles the authentic Gmail login, making it extremely difficult to distinguish from the real one.

Fake Gmail login page with a voicemail notification message on the left.
Attackers are using sophisticated and advanced evasion methods to target Gmail users. / © malwr-analysis

What is especially alarming is how the page’s script uses AES encryption to hide its identity and incorporates anti-debugging techniques, making it difficult even for developers to recognize it as a fake website.

On this page, any sensitive information entered by the user is captured by the attackers. Beyond just usernames and passwords, the system is also designed to collect additional credentials such as backup email addresses, two-factor authentication codes, and answers to security questions.

The stolen information is then transmitted to attacker-controlled servers, where it can be used to access your Google account and any connected services.

How to Protect Your Gmail and Passwords from Phishing Attacks

Users can protect themselves by carefully inspecting voicemail alerts and similar messages received in their Gmail inbox. At the same time, regularly updating your Google password and choosing stronger credentials is strongly recommended.

Additionally, transitioning to passkeys is encouraged. Passkeys are a newer and more secure authentication method that rely on biometric verification, such as facial recognition, fingerprint scanning, or PIN combinations, instead of manually entering usernames and passwords.

Are you already using passkeys on your devices? What other steps do you take to enhance your security and safeguard your personal information? Share your thoughts in the comments.

The best VPN services compared and tested

  Sponsored Editor's Choice              
  SurfShark CyberGhost NordVPN PureVPN VyprVpn ExpressVPN Private Internet Access Tunnelbear Ivacy
Name SurfShark* CyberGhost* NordVPN* PureVPN VyprVpn ExpressVPN Private Internet Access Tunnelbear Ivacy*
nextpit Tested
Go to review
Go to review
Go to review
Not yet rated
Not yet rated
Not yet rated
Not yet rated
Not yet rated
Not yet rated
Price (monthly) $2.49 to $12.95 $2.25 to $12.99 $3.49 to $11.95 $2.91 to $10.95  $6.47 to $1.81 $8.32 to $12.95  $2.03 to $9.95 $3.33 and $9.99 $2.45 to $9.95
Compatible platforms with its app - Android, iOS
- Windows, macOS, Linux
- FireTV
- Android, iOS
- Windows, macOS, Linux
- Android TV, FireTV 
- Android, iOS
- Windows, macOS, Linux
- Android TV, FireTV
- Android, iOS
- Windows, macOS, Linux
- Android TV, FireTV
- Android, iOS
- Windows, macOS
- Android TV
- Android, iOS
- Windows, macOS, Linux
- Android, iOS
- Windows, macOS, Linux
- Android, iOS
- Windows, macOS
- Android, iOS
- Windows, macOS, Linux
- Android TV, FireTV
Protocols OpenVPN, IKEv2, WireGuard OpenVPN, IKEv2, WireGuard OpenVPN, IKEv2, WireGuard L2TP, OpenVPN, IKEv2 L2TP, OpenVPN, IKEv2, WireGuard L2TP, OpenVPN, IKEv2 OpenVPN, WireGuard, IKEv2 OpenVPN, IKEv2 L2TP,  OpenVPN, IKEv2
How do I subscribe? See Options* See Options* See Options* See Options* See Options* See Options* See Options* See Options* See Options*
Name SurfShark CyberGhost NordVPN PureVPN VyprVpn ExpressVPN Private Internet Access Tunnelbear Ivacy
nextpit receives a commission for purchases made via the marked links. This has no influence on the editorial content and there are no costs for you. You can find out more about how we make money on our transparency page.
Go to comment (0)
Jade Bryan

Jade Bryan
Junior Editor

I still remember how amazed I was when I first got hold of the Nokia 3210 back when I was a kid, and it was during that time I developed my love for technology, particularly for mobile phones. I started sharing my knowledge through writing in different blogs and forums back in Nokia Nseries era. I even make videos before where I put different phones side-by-side. Today, I'm still an avid enthusiast of smartphones, but my interests have evolved into smart devices and electric vehicles.

To the author profile
Liked this article? Share now!
Recommended articles
Latest articles
Push notification Next article
No comments
Write new comment:
All changes will be saved. No drafts are saved when editing
Write new comment:
All changes will be saved. No drafts are saved when editing