Google Gmail users have received spam that appears to have been sent from their own accounts, according to reports.
Google stated that it was aware of a spam campaign impacting "a small subset of Gmail users" and that it was taking steps to protect yourself against this.
Attackers used falsified email headers to make it appear that users were sending them emails, which resulted in the misleading appearance of these emails in their uploaded files, according to Google .
The company has identified the offending emails and reclassifies them as spam, and it has no reason to believe that any accounts have been compromised as a result of the transaction.
Telus identified disguised junk mail to make it appear that he had sent them, spokesman Francois Gaboury said.
"We are aware of the problem and can confirm that the messages are not generated by Telus and that they are not sent by our server," he said.
Telus worked with third-party vendors to solve the problem, Gaboury said, adding that customers should not respond to suspicious emails.
The attack is an example of an attack by corporate identity theft combined with an identity theft, said Kevin O. Brien, CEO of
In these types of attacks, hackers manipulate email metadata or directly usurp the sending domain, which allows them to bypass pre-broadcast filters, he said. told the E-Commerce Times.
"Although cloud-based native email service providers are safer than their on-premises counterparts, these types of attacks highlight how messages are sent in their own environment," explains Mr. O & # 39; Brien. "In other words, e-mails sent from one cloud e-mail box to another never leave the infrastructure provided by Google or Microsoft [and] can pose threats that traditional security models can not stop. "
Google announced last year a new machine learning technology designed to combat spam, phishing and other types of cybercrime.
However, GreatHorn has identified a large number of attacks that have bypassed machine learning technology, said O. Brien
GreatHorn recently stopped an attack that used the attack vector "email@example.com" on several customers who run on the Gmail platform, he said. Google ended up catching it, but only after GreatHorn detected dozens of emails.
"In this example, organizations running G Suite without the Sender Policy Framework (SPF) at its strictest level were given identity theft attacks, similar to the Telus attack, where the only sign was 2018 attached to the e-mail address. "Brien note.
Google's machine learning is "finally secure," he noted, but he is often behind individual consumer protection, leaving organizations vulnerable.
Perform a self-check
Gmail users can check for the presence of a potentially spoofed message, said James Lerud, head of the Verodin Behavioral Research Team.
Click the down arrow next to the answer button and select "Show original". Then look at the SPF section. If he does not say "pass", then the email is usurped, he told the E-Commerce Times. The SPF system tracks IP addresses that are allowed to send emails on behalf of a domain.
If users suspect that a Gmail account has been hacked, they must monitor the account activity by clicking "Details" at the bottom of the Gmail page under "Last Account Activity," said Lerud. Users should periodically
review third-party access to verify which applications have access to their account.