DKIM Replay Attack Exploits Google Infrastructure in Sophisticated Phishing Scheme

A sophisticated phishing campaign used a DKIM replay exploit and Google Sites to spoof legitimate Google emails, prompting urgent scrutiny of Google’s infrastructure.

 

Cybersecurity threats are growing more advanced, and a recent case illustrates how attackers are now exploiting trusted infrastructure to bypass user defenses. In a detailed thread on X (formerly Twitter), @nicksdjohnson, lead developer of the Ethereum Name Service (ENS), shared how he was targeted by a remarkably convincing phishing campaign that appeared to originate from Google itself.

What sets this campaign apart is its legitimacy at a technical level. The phishing email passed all major authenticity checks—DKIM, SPF, and DMARC—and was delivered without any warnings. Most alarmingly, the email was sent from no-reply@google.com, and Gmail treated it as part of an existing, legitimate thread of security alerts.

Email Header Overview

This is the phishing email as it appeared in Gmail. Notice how it is signed by accounts.google.com and appears authentic to even advanced users.

The Anatomy of the Attack

The attacker’s methodology involved two key vulnerabilities in Google’s infrastructure:

1. Exploiting Google Sites for Phishing Portals

Attackers created a fake “support portal” using sites.google.com, a legacy service allowing users to host custom content under a Google-owned domain. Despite the official-looking URL, the page mimicked Google’s UI and was designed to harvest credentials.

A convincing “support case” dashboard hosted on Google Sites. Even advanced users may not notice this isn’t part of Google’s secure account infrastructure.

Clicking on links like “Upload additional documents” leads to a fake Google login form, also hosted on Google Sites—designed to harvest credentials.

2. Weaponizing OAuth Alerts to Send Signed Emails

This is where the attack becomes technically sophisticated:

  • A Google account was created with the address me@domain.com.
  • An OAuth app was created with the full phishing message as the application name.
  • When Google issued a legitimate OAuth alert to the me@... address, it was signed using Google’s infrastructure.
  • The attacker forwarded that email to a target—bypassing security checks and preserving Google’s signature.

The phishing message references a “subpoena” and includes an embedded link hosted on Google Sites.

Despite being sent via a third-party relay (fwd.privateemail.com), the email retains Google’s DKIM signature—appearing completely legitimate.

Because the attacker used “me@...” as the account, Gmail shows the alert as being sent “to me,” which is Gmail’s standard shorthand for your own address.

Google’s Response

Despite the severity of the exploit, Google declined to take action. Johnson filed a bug report which was closed with the status “Won’t Fix (Intended Behavior).”

The Takeaway

This incident demonstrates that attackers no longer rely on typos or suspicious links. By using trusted infrastructure and valid signatures, phishing emails are now indistinguishable from legitimate messages—even to experts.

  • Never rely solely on a message’s domain, authentication status, or visual design to determine legitimacy.
  • Verify login pages manually—don’t follow embedded links, especially in urgent-sounding emails.
  • Escalate any suspicious messages to your security team for sandbox analysis.

For a full technical breakdown of this phishing technique, read EasyDMARC’s analysis and view @nicksdjohnson’s thread on X.

Customer Stories

See how leading enterprise in-house teams have scaled smarter with Legal.io's high-caliber flex talent.

More from Legal.io


DOJ Proposes Breakup of Google to Restore Online Search Competition
DOJ Proposes Breakup of Google to Restore Online Search Competition

DOJ pushes Google to sell Chrome, share data, and consider divesting Android to address its search monopoly, drawing criticism from Google as extreme and overreaching.

Nov 22, 2024
Read More
Why You Should Work For a Mission-Driven Company
Why You Should Work For a Mission-Driven Company

A company’s mission statement is its declaration of where it wants to go – that means that all its activities should be geared towards helping it get there. As a Tuareg clansman in the Sahara reads the stars and the sand dunes to help him reach a certain oasis, a company’s spreadsheets and flowcharts should only be tools to enable it to arrive at its destination.

May 13, 2020
Read More
Legal and Geopolitical Tensions Rise Over Lunar Nuclear Power Ambitions

As the U.S. and China push to deploy nuclear reactors on the Moon, legal experts warn of rising ambiguity under current space law frameworks.

Aug 10, 2025
Read More
Centari Raises $8.4M to Expand AI-Powered Contract Review for High-Stakes Deals

Contract review startup Centari secures $8.4M Series A funding to scale its AI platform for complex transactions and expand its team with top law firm talent.

Sep 22, 2025
Read More
LPL Financial Waives Clawback for Departing CLO Althea Brown Amid Career Break

LPL Financial will not seek repayment of a $270K signing bonus and relocation expenses from outgoing CLO Althea Brown, who is stepping down after less than two years for a career break.

Jul 07, 2025
Read More
Ready to hire?

Schedule a free consultation to discuss your hiring needs.

Free 15-min consultation
Legal.io Platform
5 star reviews
Hiring made smarter

Easy-to-use platform for hiring legal talent, managing spend, and optimizing your panel — plus an average savings of 50%.

Need Immediate Help?

Submit a hiring request and let our experts handle the entire process for you.