Tuesday , March 4 2025
number

Hackers leverage Google’s subdomains, phone number to attack victims

Scammers called a victim using Google’s official support number and sent an email from an official subdomain. It’s unclear how they managed to use Google’s services. Software engineer Zach Latta, founder of Hack Club, reported a unique attack on GitHub.

https://gist.github.com/zachlatta/f86317493654b550c689dc6509973aa4

Chloe called Latta from 650-203-0000, identified as “Google.” According to Google’s support page, this number is used by Google Assistant for automated calls like booking appointments or checking restaurant wait times.

10 New Vulnerabilities Discovered in MediaTek Chipsets

MediaTek has released its March 2025 Product Security Bulletin, which highlights new security vulnerabilities affecting various chipsets in smartphones, tablets,...
Read More
10 New Vulnerabilities Discovered in MediaTek Chipsets

Qualcomm’s March 2025 Security Bulletin Highlights Major Vulns

Qualcomm's March 2025 Security Bulletin addresses vulnerabilities in its products, including automotive systems, mobile chipsets, and networking devices. It includes...
Read More
Qualcomm’s March 2025 Security Bulletin Highlights Major Vulns

Cyberattack detected at Polish space agency, minister says

On Sunday, Poland Minister for Digitalisation Krzysztof Gawkowski said that Polish cybersecurity services found unauthorized access to the IT infrastructure...
Read More
Cyberattack detected at Polish space agency, minister says

Nearly 12,000 API Keys and Passwords Found in Public Datasets

Security researchers found that datasets used by companies to develop large language models included API keys, passwords, and other sensitive...
Read More
Nearly 12,000  API Keys and Passwords Found in Public Datasets

Android Phone’s Unlocked Using Cellebrite’s Zero-day Exploit

Amnesty International’s Security Lab discovered a cyber-espionage campaign in Serbia, where officials used a zero-day exploit from Cellebrite to unlock...
Read More
Android Phone’s Unlocked Using Cellebrite’s Zero-day Exploit

DragonForce Ransomware Targets Saudi Company, 6TB Data Stolen

DragonForce ransomware targets organizations in Saudi Arabia. An attack on a major Riyadh real estate and construction firm led to...
Read More
DragonForce Ransomware Targets Saudi Company, 6TB Data Stolen

Microsoft Uncovers Hackers Selling Illegal Azure AI Access

Microsoft has filed an amended complaint in recent civil litigation, naming the main developers of malicious tools that bypass the...
Read More
Microsoft Uncovers Hackers Selling Illegal Azure AI Access

By 2025, India’s First Semiconductor Chip to be ready

At the Global Investors Summit 2025, Union Minister Ashwini Vaishnaw announced that India’s first indigenous semiconductor chip will be ready...
Read More
By 2025, India’s First Semiconductor Chip to be ready

CVE-2025-20111
Cisco Warns Vulns in Nexus 3000 and 9000 Series Switches

Cisco has warned of a critical vulnerability, CVE-2025-20111, in several Nexus switch models. This flaw could let attackers remotely crash...
Read More
CVE-2025-20111  Cisco Warns Vulns in Nexus 3000 and 9000 Series Switches

CVE-2025-0475 & CVE-2025-0555
GitLab’s High-Risk Flaw, Patch Now Urgently!

GitLab has released a security advisory, urging all self-managed installations to upgrade to versions 17.9.1, 17.8.4, or 17.7.6 due to...
Read More
CVE-2025-0475 & CVE-2025-0555  GitLab’s High-Risk Flaw, Patch Now Urgently!
https://gist.github.com/zachlatta/f86317493654b550c689dc6509973aa4

“She sounded like a real engineer, the connection was super clear, and she had an American accent,” the developer said.

https://gist.github.com/zachlatta/f86317493654b550c689dc6509973aa4

Scammers pretending to be Google Workspace support warned Latta that they had blocked her account after unauthorized access from Frankfurt.

Latta suspected a scam and requested email confirmation.

https://gist.github.com/zachlatta/f86317493654b550c689dc6509973aa4

Hackers surprisingly agreed and sent an email from a legitimate Google subdomain, g.co. The email looked authentic, with no signs of spoofing, and it successfully passed DKIM, SPF, and DMARC authentication checks. Latta shared the evidence in a post.

According to Google, g.co is an official URL shortcut that is “just for Google websites.”

“You can trust that it will always take you to a Google product or service,” the landing page for the domain reads.

Scammers suggested that the account may have been hacked via a Chrome extension and used fake LinkedIn accounts to falsely claim they worked at Google.

“Chloe” tried to trick the developer into taping one of the three numbers that popped up on his phone to “reset the account.” In reality, this action would have given scammers access to the account if performed.

The software engineer recorded the conversation when he suspected it was a phishing attempt.

“The thing that’s crazy is that if I followed the two ‘best practices’ of verifying the phone number + getting them to send an email to you from a legit domain, I would have been compromised,” Latta warns.

Google has not yet publicly addressed this specific issue.

Users should be careful with suspicious calls or emails and report any suspicious activity to Google’s security team.

Source: Cybernews, GitHub

Check Also

semiconductor

By 2025, India’s First Semiconductor Chip to be ready

At the Global Investors Summit 2025, Union Minister Ashwini Vaishnaw announced that India’s first indigenous …

Leave a Reply

Your email address will not be published. Required fields are marked *