{"id":7256,"date":"2025-04-23T11:34:11","date_gmt":"2025-04-23T08:34:11","guid":{"rendered":"https:\/\/mummila.net\/kettinki\/?p=7256"},"modified":"2025-04-23T11:34:11","modified_gmt":"2025-04-23T08:34:11","slug":"phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack","status":"publish","type":"post","link":"https:\/\/mummila.net\/kettinki\/linkki\/7256","title":{"rendered":"<svg class=\"svg-icon svg-icon-link\" aria-labelledby=\"title-69d804a2db08e\" role=\"img\"><title id=\"title-69d804a2db08e\">Link<\/title> <use href=\"#link\" xlink:href=\"#link\"><\/use> <\/svg>7256"},"content":{"rendered":"<div class=\"vlp-link-container vlp-layout-basic\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/phishers-abuse-google-oauth-to-spoof-google-in-dkim-replay-attack\/\" class=\"vlp-link\" title=\"Phishers abuse Google OAuth to spoof Google in DKIM replay attack\" rel=\"nofollow\" target=\"_blank\"><\/a><div class=\"vlp-layout-zone-side\"><div class=\"vlp-block-2 vlp-link-image\"><img loading=\"lazy\" decoding=\"async\" style=\"max-width: 150px;\" width=\"150\" height=\"74\" src=\"https:\/\/mummila.net\/kettinki\/files\/2025\/04\/Gmail.jpg\" class=\"attachment-150x999 size-150x999\" alt=\"\" srcset=\"https:\/\/mummila.net\/kettinki\/files\/2025\/04\/Gmail.jpg 1621w, https:\/\/mummila.net\/kettinki\/files\/2025\/04\/Gmail-300x148.jpg 300w, https:\/\/mummila.net\/kettinki\/files\/2025\/04\/Gmail-1024x505.jpg 1024w, https:\/\/mummila.net\/kettinki\/files\/2025\/04\/Gmail-768x379.jpg 768w, https:\/\/mummila.net\/kettinki\/files\/2025\/04\/Gmail-1536x758.jpg 1536w, https:\/\/mummila.net\/kettinki\/files\/2025\/04\/Gmail-1600x790.jpg 1600w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/div><\/div><div class=\"vlp-layout-zone-main\"><div class=\"vlp-block-0 vlp-link-title\">Phishers abuse Google OAuth to spoof Google in DKIM replay attack<\/div><div class=\"vlp-block-1 vlp-link-summary\">In a rather clever attack, hackers leveraged a weakness that allowed them to send a fake email that seemed delivered from Google\u2019s systems, passing all verifications but pointing to a fraudulent page that collected logins.<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"link","meta":{"footnotes":""},"categories":[14097],"tags":[32498,32497,3404,589,32496,22616,19],"class_list":["post-7256","post","type-post","status-publish","format-link","hentry","category-in-english","tag-easydmarc","tag-ethereum-name-service","tag-gmail","tag-google","tag-nick-johnson","tag-paypal","tag-security","post_format-post-format-link"],"_links":{"self":[{"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/posts\/7256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/comments?post=7256"}],"version-history":[{"count":1,"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/posts\/7256\/revisions"}],"predecessor-version":[{"id":7258,"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/posts\/7256\/revisions\/7258"}],"wp:attachment":[{"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/media?parent=7256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/categories?post=7256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mummila.net\/kettinki\/wp-json\/wp\/v2\/tags?post=7256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}