top of page

Ongoing Google Attack Compromises Passwords and 2FA—Immediate Action Required

Writer's picture: Anup GhoshAnup Ghosh

The Download

A persistent cyberattack campaign is targeting Google account holders, successfully stealing both passwords and two-factor authentication (2FA) tokens. The "Google Perpetual Hack" operation employs phishing techniques that deceive users into revealing their credentials and 2FA codes, effectively bypassing security measures designed to protect accounts. Attackers create Google Ads that appear to promote legitimate services, such as software downloads, cloud services, or popular platforms like Google. These ads are crafted to look authentic, mimicking branding and language used by the legitimate companies. When a user clicks on the ad, they are redirected to a phishing site designed to look identical to the legitimate service's login or sign-up page.

Users are prompted to enter their login credentials, including passwords and two-factor authentication (2FA) codes. Since the site appears legitimate, users may not suspect malicious intent.


Once attackers gain access, they can control email communications, access sensitive data, and potentially infiltrate connected systems, posing significant risks to both individual and organizational security.


What You Can Do

To defend against this threat, IT administrators should implement robust security protocols, including the use of hardware security keys for 2FA, which are less susceptible to phishing attacks compared to traditional methods. Regularly educating users about the dangers of phishing and the importance of verifying the authenticity of any communication requesting credentials is crucial. Additionally, monitoring account activities for unusual behavior and promptly responding to security alerts can help mitigate potential breaches. Ensuring that all systems are up to date with the latest security patches further strengthens the organization's defense against such sophisticated attacks.


Monitor your network attack surfaces with ThreatMate. Sign up for a demo today.


To Learn More:

149 views
bottom of page