Google’s g.co Subdomain Hacked – Beware of This Dangerous Phishing Attack
News
🚨 New Cybersecurity Threat: Hackers Exploit Google’s g.co Subdomain to Steal Accounts
A new phishing scam has emerged, exploiting Google’s g.co subdomain to carry out a highly sophisticated vishing attack (voice phishing). This Google hack was revealed by Zach Latta, founder of Hack Club, who nearly fell victim despite being a tech-savvy user.
🔍 How This Google Phishing Attack Works
Cybercriminals are using Google’s g.co domain—a legitimate and widely trusted Google URL—to make their scam appear genuine. Here’s how the attack unfolds:
1️⃣ A fake call from "Google Support"
Attackers pretend to be Google representatives, warning users about suspicious activity on their accounts.
2️⃣ They direct victims to a "Google" link
The malicious link, hosted on g.co, looks official, tricking victims into believing it’s safe.
3️⃣ Account takeover
Victims unknowingly provide access credentials, allowing hackers to remotely control their Google accounts.
🚀 Why This Phishing Scam Is So Dangerous
Uses Google’s own domain, making it hard to detect.
Targets even tech-savvy users, not just beginners.
Could bypass security measures if users follow instructions.
🔒 How to Protect Your Google Account from Hackers
Never share personal information over the phone.
Double-check any links before clicking—even if they look like official Google URLs.
Enable Google’s 2FA (Two-Factor Authentication) for extra security.
Stay updated on the latest cybersecurity threats and phishing attacks.
⚠️ Cybersecurity Experts Warn: Stay Alert!
With hacking techniques evolving rapidly, users must stay cautious and only trust official Google security updates. If you suspect a scam, report it immediately to Google Support and update your security settings.
For the latest cybersecurity news, Google hacks, and tech updates, stay tuned to SysCare.lk your trusted source for online security news.