When the Security Warning IS the Scam
Cybersecurity News
May 5, 2025
Phishing attacks have evolved far beyond poorly written emails and suspicious links. In a recent incident that shook the cybersecurity community, software engineer Nick Johnson uncovered a phishing attempt so sophisticated, it bypassed all conventional defenses — by using Google’s own infrastructure.
Let’s break down what happened, how the attack worked, and what this means for any organization that relies on Google Workspace.
The Email That Looked Too Real
It started with an email from no-reply@google.com. At first glance, it was indistinguishable from a real security notification. It passed every technical test — DMARC, SPF, DKIM. The subject line looked urgent. The message was threaded alongside legitimate Google alerts.
But something was off.
The email linked to what appeared to be a Google support portal hosted on sites.google.com, a legitimate Google-owned domain. It even mimicked the interface of an official Google help desk. There were options to “Upload additional documents” and “View your case.” Clicking either led to a convincing login screen — designed to steal credentials.
A Masterclass in Exploiting Trust
Here’s how the attackers pulled this off — step by step:
Create a Fake Google Account
They started with something simple: creating a Google account with an email like me@fakecompany.com.Build a Malicious OAuth App
They created an OAuth application and gave it a long, manipulative name like:
“Your account has been flagged for violating the Terms of Service. Please respond to this legal request...”
The name was so long that in certain email clients, only the ending appeared — something like “Google Legal Support.”Trigger a Real Google Alert
Once the attacker approved the OAuth app on their own account, Google’s systems automatically generated a real alert about that approval.Forward the Alert to the Target
That alert, when forwarded to a target, looked entirely legitimate. It passed authentication. It came from Google’s servers. It even addressed the recipient as “me” — as Gmail does when showing your own address.
Why This Was So Dangerous
There were no spoofed domains. No broken English. No bad grammar. Just a real-looking email about an app approval the target never made — linking to a page hosted on a google.com subdomain.
And there was no simple “Report Phishing” option on the fake support site. That made it harder for recipients to report the issue, and harder for defenders to intervene quickly.
This attack didn’t just abuse trust — it abused design logic. It manipulated how systems are expected to work and how users are expected to interpret those systems.
Google’s Initial Response: “Working As Intended”
When Johnson reported the exploit, Google’s first response was that the system had functioned as designed. The alert went to the account holder — even if it was weaponized.
But after widespread attention, Google acknowledged the issue and committed to closing the loophole, preventing OAuth apps from being misused in this way going forward.
It was a win — but one that came after damage had already been done.
Lessons for All of Us
This incident is a wake-up call. Here’s what we should take away:
Authentication headers aren’t enough — even well-structured, technically valid emails can be dangerous.
Not all trusted domains are safe — phishing pages can live on sites.google.com, dropbox.com, and other reputable platforms.
Attackers are getting smarter with permissions — OAuth approvals, login flows, and browser security cues are being weaponized.
Systems built on trust can be abused — and defenders need tools that go beyond surface-level filters.
How Lockwell — and Elle — Would Help
Attacks like this don’t rely on obvious signs. There’s no malware. No weird wording. No sketchy domain. Instead, they abuse logic, infrastructure, and user expectations.
This is exactly the kind of threat that traditional security tools often miss — and where AI-powered defense, like Lockwell and Elle, excels.
Here’s how Lockwell would help defend against an attack like this:
Smarter Email Firewall
Lockwell’s built-in Email Firewall doesn’t just look for bad links or sender mismatches. It analyzes message structure, tone, urgency patterns, and the behavioral intent behind links — even when emails come from legitimate domains.
In cases like this, where technical validation passes, Elle looks for misaligned context — like OAuth alerts that weren't triggered by the actual user, or security language that doesn’t fit the org’s normal patterns.
Real-Time Monitoring from Elle
Elle constantly monitors how users interact with messages and websites. If a team member clicks a link to a Google Sites page that mimics a login portal, Elle evaluates the destination, and requested actions — not just the domain.
If the interaction looks like a phishing attempt, Elle can:
Flag the behavior
Lock access temporarily
Isolate the device
Alert your admin with a full context trail
OAuth + SaaS Login Oversight
Lockwell tracks all “Sign in with Google” activity, OAuth app approvals, and suspicious access requests across your organization. Elle watches for new or abnormal authorizations and flags anything that doesn’t match historical behavior — including apps with long names or unusual scopes.
If someone unknowingly approves a malicious OAuth app, Elle can help you revoke access and understand what data may have been exposed.
Forensic Logging and Response
In the event of a phishing attempt or credential misuse, Lockwell provides detailed forensic logs showing:
Which user clicked which link
What systems were accessed
When the behavior occurred
What other accounts or devices were involved
Elle helps turn that into a response plan — fast.
Security Awareness That Actually Works
This wasn’t an “obvious phishing email,” and that’s the point. Lockwell’s embedded awareness training and just-in-time coaching help teams spot these gray-area moments. Elle gives users real-time nudges when behavior looks risky and reinforces smart habits over time.
Why AI Defense Makes the Difference
Traditional security systems are designed to catch known threats. Elle was built for the unknowns — the creative, logic-abusing, infrastructure-twisting threats like this one.
She doesn’t just filter. She adapts.
She doesn’t just alert. She takes action.
This is where AI makes all the difference — and where small teams, nonprofits, and growing businesses finally get the kind of protection that used to require a full security team.
Final Thought
This wasn’t just a phishing attack — it was a case study in how attackers manipulate trust. And the best defense against that isn’t more rules or filters. It’s intelligence that sees through the surface.
With Lockwell and Elle, your team doesn’t just get alerts. You get action, visibility, and a partner that helps you stay ahead — even when the threat looks legitimate.