{"id":58519,"date":"2025-04-18T16:58:12","date_gmt":"2025-04-18T16:58:12","guid":{"rendered":"http:\/\/652a0ca2-6315-4d05-a12d-86565b801bd2"},"modified":"2025-04-18T16:58:12","modified_gmt":"2025-04-18T16:58:12","slug":"that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/","title":{"rendered":"That Google email look real? Don&#8217;t click &#8211; it might be scam. Here&#8217;s how to tell"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/eb97d55661b319349296d21ebc8fef6bcc3e0ef5\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=768\" alt=\"phaishingcolors-gettyimages-2188562101\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/072460080595fd9983e8a03a731dee4e14bad3cd\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1024\" alt=\"phaishingcolors-gettyimages-2188562101\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/93475d957cf17afb219158bcc9a949d2524f5250\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280\" alt=\"phaishingcolors-gettyimages-2188562101\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/93475d957cf17afb219158bcc9a949d2524f5250\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280\" alt=\"phaishingcolors-gettyimages-2188562101\" width=\"1280\" height=\"960\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Aitor Diago\/Getty Images<\/span><\/figcaption><\/figure>\n<p>A sophisticated phishing scam is taking advantage of Google security flaws to convince people that the malicious emails and website are legitimate.<\/p>\n<p>In a series of X posts <a href=\"https:\/\/www.androidauthority.com\/google-phishing-email-attack-authenticated-3544190\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">spotted by Android Authority<\/a>, developer Nick Johnson explained how he was <a href=\"https:\/\/x.com\/nicksdjohnson\/status\/1912439036347625942\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">targeted by a phishing attack<\/a> that exploits flaws in Google&#8217;s own infrastructure. In his first post, Johnson includes a screenshot of the scam email claiming that Google had been served a subpoena requiring it to produce a copy of his Google account data.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/clicked-on-a-phishing-link-7-steps-to-take-immediately-to-protect-your-accounts\/\">Clicked on a phishing link? 7 steps to take immediately to protect your accounts<\/a><\/strong><\/p>\n<p>The text of the email reads correctly; that is, it uses the right terms and doesn&#8217;t contain any typos or broken English. The message itself is considered valid and signed by Google. It&#8217;s sent from no-reply@google.com, a legitimate, automated company-used address. The email itself passes the DKIM signature check, which aims to verify the authenticity of a message. No other warnings appear, so this looks completely legitimate.<\/p>\n<p>Clicking a Sites link in the email takes you to a support portal that looks like an actual Google page. The page is even hosted on <a href=\"http:\/\/sites.google.com\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">Google Sites<\/a>, a platform where people can create and run their own websites. Using such a platform adds legitimacy to the scam as people assume it&#8217;s the real deal.<\/p>\n<p><!----><\/p>\n<p>Clicking a link to &#8220;Upload additional documents&#8221; or &#8220;View case&#8221; takes you to a sign-in screen, which also looks like it comes from Google. At this point, there is one tip-off that this could be a scam. As Johnson notes, the sign-in screen is hosted on Google Sites instead of a Google account page, where you normally log in.<\/p>\n<p>That&#8217;s when Johnson ended the process. Had he entered his username and password, his presumption is that the attackers would have stolen his login credentials and used them to compromise his Google account.<\/p>\n<p>&#8220;This recent phishing attack exploits legitimate Google features to send crafted emails that bypass some traditional checks, as well as leverage Google Sites to host spoofed pages and harvest credentials,&#8221; said Melissa Bischoping, head of security research at cybersecurity firm Tanium.&nbsp;<\/p>\n<p>&#8220;The email leveraged an OAuth application combined with a creative DKIM workaround to bypass the types of safeguards meant to protect against this exact type of phishing attempt,&#8221; explained Bischoping. &#8220;What makes this tactic particularly dangerous isn&#8217;t just the technical sleight of hand, but the deliberate use of trusted services to slip past both users and detection tools.&#8221;<\/p>\n<p>The blame for this scam should obviously be aimed squarely at the scammers themselves. But Google is also on the hook, as this exploit is possible due to a couple of security vulnerabilities.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/best-chrome-vpn\/\">The best VPN extensions for Chrome: Expert tested and reviewed<\/a><\/strong><\/p>\n<p>First, Google Sites is a legacy product that still allows for arbitrary scripts and embeds, according to Johnson. This weakness could allow an attacker to add arbitrary and malicious code and embedded objects to a web page. Second, closer inspection of the email reveals that it came not from Google but from a <a href=\"https:\/\/privateemail.com\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">privateemail.com<\/a> address. That raises the question of how and why Google signed it in the first place.<\/p>\n<p>After receiving the scam email, Johnson said he contacted Google to alert them to the vulnerabilities. Initially, the company apparently brushed aside his concerns, claiming that all of this was intended behavior. But then Google reversed its stance and has since indicated that it will fix these bugs.<\/p>\n<p>&#8220;More threat actors are deliberately choosing to leverage services that have very legitimate business use cases, underscoring the trend that, as detection tools get stronger, adversaries are looking for ways to evade detection altogether, not necessarily outsmart them with expensive exploits,&#8221; Bischoping said. &#8220;They&#8217;re focusing on the tools, sites, and functions organizations use in their daily work. By blending in with normal traffic, and the likelihood that a typical recipient won&#8217;t look that closely at a trusted domain like &#8216;google.com,&#8217; threat actors have a high rate of success without significant investment.&#8221;<\/p>\n<p>Thanks go to Johnson for not only catching this scam and warning people but for pressing Google to resolve the issue. Until a fix is rolled out, however, how can you protect yourself against such sophisticated phishing attacks?<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/data-stealing-cyberattacks-are-surging-7-ways-to-protect-yourself-and-your-business\/\">Data-stealing cyberattacks are surging &#8211; 7 ways to protect yourself and your business<\/a><\/strong><\/p>\n<p>Thomas Richards, infrastructure security practice director at security provider Black Duck, offers the following recommendations.<\/p>\n<ol>\n<li>Beware of any email that urges immediate action and tells you you might face negative consequences. This is typically a sign that the email is malicious.<\/li>\n<li>Check the &#8220;from&#8221; and &#8221; to&#8221; email addresses. If the &#8221; from&#8221; domain isn&#8217;t the actual company or the &#8220;to&#8221; recipient is not you, the email is likely a scam.<\/li>\n<li>Avoid clicking on links in the email. In the attack described by Johnson, the malicious site is hosted on a Google domain. However, Google would never send you a legal complaint and then direct you to the Google Sites domain. If you&#8217;re in doubt, log into your Google account separately without clicking on any link and see if any messages or alerts are waiting for you.<\/li>\n<li>Finally, run an online search for the content of the email. That can tell you if others have reported it as a scam or received a similar email.<\/li>\n<\/ol>\n<p><em>Stay ahead of security news with <\/em><a href=\"https:\/\/www.zdnet.com\/newsletters\/\"><strong><em>Tech Today<\/em><\/strong><\/a><em>, delivered to your inbox every morning.<\/em><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Until Google rolls out a fix, you&#8217;ll have to be on the lookout for this particularly convincing phishing scam.READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-58519","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>That Google email look real? Don&#039;t click - it might be scam. Here&#039;s how to tell 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"That Google email look real? Don&#039;t click - it might be scam. Here&#039;s how to tell 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-18T16:58:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/93475d957cf17afb219158bcc9a949d2524f5250\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"That Google email look real? Don&#8217;t click &#8211; it might be scam. Here&#8217;s how to tell\",\"datePublished\":\"2025-04-18T16:58:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/\"},\"wordCount\":930,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/93475d957cf17afb219158bcc9a949d2524f5250\\\/2025\\\/04\\\/18\\\/a04f9a1e-20b0-4abc-b881-48554c0353fa\\\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/\",\"name\":\"That Google email look real? Don't click - it might be scam. Here's how to tell 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/93475d957cf17afb219158bcc9a949d2524f5250\\\/2025\\\/04\\\/18\\\/a04f9a1e-20b0-4abc-b881-48554c0353fa\\\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2025-04-18T16:58:12+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/93475d957cf17afb219158bcc9a949d2524f5250\\\/2025\\\/04\\\/18\\\/a04f9a1e-20b0-4abc-b881-48554c0353fa\\\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/93475d957cf17afb219158bcc9a949d2524f5250\\\/2025\\\/04\\\/18\\\/a04f9a1e-20b0-4abc-b881-48554c0353fa\\\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"That Google email look real? Don&#8217;t click &#8211; it might be scam. Here&#8217;s how to tell\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"That Google email look real? Don't click - it might be scam. Here's how to tell 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/","og_locale":"en_US","og_type":"article","og_title":"That Google email look real? Don't click - it might be scam. Here's how to tell 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-04-18T16:58:12+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/93475d957cf17afb219158bcc9a949d2524f5250\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"That Google email look real? Don&#8217;t click &#8211; it might be scam. Here&#8217;s how to tell","datePublished":"2025-04-18T16:58:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/"},"wordCount":930,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/93475d957cf17afb219158bcc9a949d2524f5250\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/","url":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/","name":"That Google email look real? Don't click - it might be scam. Here's how to tell 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/93475d957cf17afb219158bcc9a949d2524f5250\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280","datePublished":"2025-04-18T16:58:12+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/93475d957cf17afb219158bcc9a949d2524f5250\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/93475d957cf17afb219158bcc9a949d2524f5250\/2025\/04\/18\/a04f9a1e-20b0-4abc-b881-48554c0353fa\/phaishingcolors-gettyimages-2188562101.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/that-google-email-look-real-dont-click-it-might-be-scam-heres-how-to-tell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"That Google email look real? Don&#8217;t click &#8211; it might be scam. Here&#8217;s how to tell"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=58519"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/58519\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=58519"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=58519"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=58519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}