Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Sandworm Targets Critical OT Assets, Pivoting from
May 14, 2026
New Malware Framework: Screen Control, Browser & Enables Artifact
May 14, 2026
Home/Threats/Threat Actors Use Google Cloud to Steal Microsoft Leversges Services
Threats

Threat Actors Use Google Cloud to Steal Microsoft Leversges Services

Exploiting the trusted infrastructure of Google Cloud services, a sophisticated new phishing campaign is bypassing security filters to steal sensitive Microsoft 365 login credentials. By abusing...

Sarah simpson
Sarah simpson
January 7, 2026 2 Min Read
59 0

Exploiting the trusted infrastructure of Google Cloud services, a sophisticated new phishing campaign is bypassing security filters to steal sensitive Microsoft 365 login credentials.

By abusing legitimate workflow automation tools, threat actors are crafting convincing attacks that blend seamlessly with authentic communications, making detection increasingly difficult for both automated systems and end-users.

This campaign specifically targets organizations relying on cloud-based collaboration platforms, exploiting the interoperability between major service providers to facilitate credential harvesting on a massive scale.

The core of this attack involves the exploitation of Google Cloud Application Integration, a service designed for automating business processes.

Attackers utilize the “Send Email” feature within this platform to generate phishing emails that appear to originate from a genuine Google address: noreply-application-integration@google[.]com.

Because these emails come from a verified Google domain and utilize a point-and-click configuration system, they easily evade standard spam filters and leverage the inherent trust associated with the tech giant’s infrastructure to deceive targets.

Malwarebytes researchers identified that this method significantly lowers the barrier to entry for cybercriminals, especially since new Google Cloud customers currently receive free credits which attackers abuse.

The impact of this campaign is severe, as it exposes critical corporate credentials to theft. Once the initial email is delivered, unsuspecting users are presented with what appears to be a routine notification, such as a voicemail alert or a document permission request, further legitimizing the malicious correspondence.

The Infection Mechanism

The attack employs a clever multi-stage infection mechanism to evade detection. When a victim clicks the link in the phishing email, they are not immediately taken to a malicious site.

Instead, they are directed to a legitimate Google Cloud Storage URL, which reinforces the illusion of safety.

From there, the user is redirected to another Google-owned domain, googleusercontent[.]com, which displays a CAPTCHA or “I’m not a robot” image check.

This intermediate step serves two critical purposes: it successfully filters out automated security crawlers that might flag the phishing site and psychologically primes the victim to comply.

Upon passing the check, the target is finally redirected to a fraudulent Microsoft 365 sign-in page designed to capture usernames and passwords. Although this page visually mimics the official portal, a close inspection of the web address reveals its malicious nature.

Google has acknowledged this abuse and stated that they have blocked several associated campaigns, clarifying that this activity stems from the misuse of a workflow automation tool rather than a compromise of their infrastructure.

Security professionals are advised to inspect URLs carefully, as the final landing page is hosted on non-official domains, and to implement robust multi-factor authentication to protect user accounts.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

TOTOLINK EX200 Extender Vulnerability Allow Attacker to Gain Full

Next Post

Chinese Hackers Use NFC Android Malware to Ste Deploy NFC-enabled

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Canon MailSuite Flaw Allows Remote Code Execution
May 14, 2026
Anthropic Mythos AI Finds macOS Flaws B Anthropic’s Reportedly
May 14, 2026
Hackers Compromise 170 npm Packages to Steal GitHub
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us