Phishing emails and fake Google calls are compromising accounts—here’s how the scam works and how to stay safe
Gmail, the world’s most used email service, is under attack. A new wave of phishing scams is deceiving users into giving away their login credentials. The scam is smart and subtle: emails look real, come from seemingly official addresses, and don’t raise suspicion.
The danger doesn’t stop at emails. Victims are also receiving phone calls from fake Google technicians who guide them—step by step—into handing over their two-factor authentication (2FA) codes, thinking they are protecting their accounts.
This scam follows a simple but effective script:
What makes this scam so effective is the emotional manipulation. Victims are convinced they are being helped—until it’s too late.
Google has confirmed the scam and reassured users: it’s not widespread, but it’s growing and dangerous. The official stance is clear: Google will never call you to ask for account credentials or verification codes.
Ross Richendrfer, Gmail spokesperson, strongly recommends users enable anti-phishing measures like security keys or passkeys, which are much harder for scammers to bypass.
If you’ve fallen for the trick, you have 7 days to recover your Gmail account. During this period, you can still use your original recovery email or phone number, even if the attacker has changed them.
Never try random recovery tricks—only follow official Google instructions.
The most effective defense is enabling 2-step verification. For even better protection, use physical security keys. Google has also rolled out Gemini Nano protection in Chrome 137, detecting suspicious behavior directly on your device.
1. What is a Gmail phishing scam?
A fake email or phone call impersonating Google to steal your credentials.
2. Does Google ever call users?
No, Google will never contact you to ask for recovery codes or personal data.
3. What if I gave away my 2FA code?
Immediately start the official recovery process from Google.
4. How can I enable 2-step verification?
Go to “Manage your Google Account” → “Security” → “How you sign in”.
5. What are security keys?
Physical devices that prevent unauthorized logins.
6. Can I recover my Gmail after it’s hacked?
Yes, but you must act within 7 days using your original recovery data.
7. How can I spot a phishing email?
Check the sender’s address, avoid suspicious links, and don’t share personal info.
8. What is Gemini Nano?
An AI-based security layer in Chrome that blocks suspicious activities.
9. What should I do if I get a suspicious call?
Hang up immediately and report the number.
10. Is this scam illegal?
Yes. It is a criminal offense and should be reported to authorities.
We will send you periodical important communications and news about the digital world. You can unsubscribe at any time by clicking the appropriate link at the bottom of the newsletter.
The Chinese hacker group turning every vulnerability into an attack opportunity In the vast ecosystem…
When WordPress works… but only on your computer You’ve just installed WordPress on a brand new domain.…
In this article, we’ll explore what User Interface Design (UI Design) is, why it’s crucial…
With generative AI on the rise, winning mentions is now the key to online brand…
The latest update from Mountain View gives publishers greater control over advertising experiments and a…
After weeks of relative calm, Google Search rankings saw a significant spike in volatility on May 8, 2025, initially in…