A novel phishing campaign discovered in December 2025 is successfully bypassing email security controls by abusing a legitimate feature in Google Cloud's Application Integration service. Threat actors are exploiting the service's "Send Email" task to dispatch malicious emails from the trusted, Google-owned domain noreply-application-integration@google.com. Because these emails originate from Google's infrastructure, they pass SPF and DMARC authentication checks, making them appear legitimate and significantly increasing their delivery rate. The campaign has already targeted thousands of users globally with emails designed to mimic routine business notifications, luring them to credential harvesting sites. This "living off the land" tactic highlights a growing trend of attackers misusing trusted cloud services to evade detection.
noreply-application-integration@google.com.This attack is a prime example of Enterprise Application Abuse, a sub-technique of T1102 - Web Service. The attackers are not compromising Google's infrastructure; they are using a publicly available feature for malicious purposes.
Attack Chain:
The impact of this campaign is medium to high. While it doesn't involve a vulnerability in Google Cloud itself, its effectiveness in bypassing security controls is significant. The high credibility of the sender address (google.com) dramatically increases the likelihood that users will click the malicious link. A successful attack can lead to:
This tactic forces security teams to look beyond simple sender verification and scrutinize the content and intent of emails even from trusted sources.
Detection Strategies:
noreply-application-integration@google.com that contain suspicious links or language. This requires more advanced content analysis.Response:
Strategic Recommendations:
Train users to identify and report phishing attempts, focusing on the context of the email rather than just the sender's address.
MFA is the most effective mitigation against credential theft resulting from successful phishing attacks.
Mapped D3FEND Techniques:
Use advanced email security solutions that perform time-of-click URL analysis to block access to malicious landing pages.
Mapped D3FEND Techniques:
Since this phishing campaign uses a legitimate Google sender address, traditional sender reputation checks fail. Therefore, advanced URL Analysis at the time of click is essential. A secure email gateway should be configured to rewrite all URLs in incoming emails. When a user clicks the link, the request is first proxied through the security vendor's service, which analyzes the destination page in real-time for signs of a credential harvesting kit or malware. This protects the user even if the email itself looks legitimate, as the malicious destination will be blocked before the user's browser can render it.
The ultimate goal of this phishing campaign is credential theft. The most effective defense against the misuse of stolen credentials is to implement phishing-resistant Multi-factor Authentication (MFA) for all user-facing applications. Even if a user is tricked by the legitimate-looking Google email and enters their password on a fake login page, the attacker will not be able to access their account without the second factor (e.g., a FIDO2 security key, authenticator app). This control effectively neutralizes the primary threat of the campaign.
For organizations using Google Cloud, it's possible to mitigate this threat at the source. Using Google Cloud Organization Policies, administrators can create a policy that denies the use of the Application Integration service by default. Access can then be granted on an exception basis only to specific projects that have a legitimate business need for it. This prevents any user from creating a shadow IT project and abusing the service to launch a phishing campaign, effectively hardening the cloud environment against this specific misuse.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats