chat
expand_more

Replay, Reuse, and Rob: How Attackers Exploit DKIM and Turn Google OAuth Alerts into Phishing Lures

Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
April 16, 2025

Email authentication protocols like SPF, DKIM, and DMARC are intended to protect users from impersonation and fraud. But as this campaign shows, even these safeguards can be turned against the very people they’re meant to protect.

In a recent campaign observed in Abnormal’s environment that has also been heavily discussed on X/Twitter, threat actors leveraged a DKIM limitation to bypass authentication and deliver Google-branded phishing emails signed by legitimate domains, including those belonging to Google itself. The result? Phishing emails that passed security checks, landed in inboxes, and appeared completely legitimate to their recipients.

The technique is called a DKIM replay attack, and while this isn’t the first time DKIM has been exploited, it’s rare to see the technique used this effectively and with infrastructure from a company like Google. This campaign is a reminder that even strong authentication isn’t foolproof—and behavioral analysis is more important than ever.

Breaking Down the DKIM Replay Attack

DKIM (DomainKeys Identified Mail) is an email authentication protocol that allows the sending server to attach a digital signature to an email. When received, the recipient server uses the sending domain’s public key to verify that the email was genuinely sent from that domain and wasn’t altered in transit.

This attack takes advantage of a critical email security gap: DKIM-signed messages can be replayed as long as the body remains unchanged. So if a malicious actor gets access to a previously legitimate DKIM-signed email, they can resend that exact message at any time, and it will still pass authentication.

Rather than forging a message or mimicking a domain, the attackers created an OAuth app with a phishing lure embedded in the app name, triggered a legitimate DKIM-signed alert by granting the app access to their Google account, and then forwarded that message unaltered through a trusted mail forwarding service.

Because the body content remained intact, the original DKIM signature still aligned with the sending domain and public key. And since SPF and DMARC don’t override a valid DKIM result, the email passed all authentication layers, even though it came from a server unaffiliated with Google.

Here’s a step-by-step breakdown of the DKIM replay attack.

1. Attacker Creates Google Infrastructure

  • Registers a Gmail account.

  • Registers an OAuth app and sets the app name to a phishing lure, such as:

Google Legal: A subpoena has been issued. View the case:
https://sites.google.com/u/17918456/d/1W4M_jFajsC8YKeRJn6tt_b1Ja9Puh6_v/edit

2. Trigger the Signed Alert Email

  • The attacker grants the OAuth app access to their Google account.

  • Google sends a DKIM-signed alert from:

no-reply@accounts.google.com
  • The phishing content is embedded in the body as part of the app name.

3. Replay the Message to the Target

  • The attacker forwards the message unaltered through:

fwd-03.fwd.privateemail.com
  • Because the content is untouched, the DKIM signature from Google remains valid.

  • The message is relayed via trusted infrastructure, including registrar-servers[.]com and jellyfish[.]systems

DKIM Replay Google Phishing Attack Email

4. Delivery and Authentication Passes

  • SPF, DKIM, and DMARC pass during earlier ARC chain hops.

  • Microsoft and downstream relays ultimately flag the final authentication as failed, but Google’s DKIM signature was valid earlier, and some SEGs may still accept it.

Should the target click the embedded button labeled “Check activity”, they are redirected to a phishing page hosted on sites.google[.]com that is crafted to appear as a portal for Support Cases, convincingly imitating the kind of UX an employee would expect from Google.

DKIM Replay Attack Fake Support Cases Page

If the target clicks either "Upload additional documents" or "View case", they are redirected to an exact replica of the Google sign-in page designed to steal login credentials.

DKIM Replay Attack Fake Google Sign in

The only indicator that the page is fraudulent is the domain, which is, once more, sites.google[.]com instead of accounts.google[.]com.

Email Header Analysis: Following the Replay Path

To better understand how this attack made it past authentication checks, we examined the message headers at each stage of its journey. The results reveal how earlier hops preserved validation results, even after the message left Google’s infrastructure.

DKIM Validation (Early hop via Google):

dkim=pass header.i=@accounts.google.com
header.s=20230601

SPF Validation (Forwarder):

spf=pass (google.com: domain of SRS1=/pix=eforward.registrar-servers.com... designates 198.54.122.148 as permitted sender)

DMARC Alignment:

dmarc=pass (policy=reject) header.from=accounts.google.com

Later Microsoft ARC Authentication:

dkim=fail (signature did not verify) header.d=accounts.google.com;
dmarc=fail action=oreject header.from=accounts.google.com;

This means that by the time Microsoft validates it, the email is flagged as a spoof. However, upstream relays (like Google and PrivateEmail) accepted and relayed the email successfully, preserving the authentication results. Although Microsoft ultimately flags DKIM/DMARC as failed, the ARC (Authenticated Received Chain) preserves earlier authentication results, which some downstream systems may trust when making delivery decisions.

What Makes the DKIM Replay Tactic Effective

Several technical and behavioral elements contributed to the effectiveness of this campaign.

Component

Explanation

DKIM Replay

The message was generated and signed by Google, then forwarded without modification.

DMARC Alignment

DKIM aligned with accounts.google[.]com, causing DMARC to pass in early validation.

OAuth App Name Abuse

The phishing message was inserted into the app name, which is embedded by Google in the alert email.

Trusted Redirector

The link led to sites.google[.]com, a Google-owned domain, boosting trust.

Forwarding Chain

Forwarders like privateemail[.]com preserved original DKIM headers.


From the clever use of OAuth app naming to the exploitation of trusted infrastructure, each component played a role in helping the phishing email evade detection and earn the target’s trust.

Why Is This Attack Difficult to Detect?

The biggest challenge in detecting this attack is that it doesn’t rely on spoofing alone—it uses authenticated infrastructure to send malicious content.

By leveraging DKIM-signed headers from legitimate domains, the emails passed all authentication checks. Thus, traditional security tools that rely on authentication failures or domain reputation will struggle to detect this attack. In fact, they may interpret the message as more trustworthy because of the successful DKIM check.

Further, Google is one of the most recognized and trusted brands in the world. When a message looks and feels like a real notification from Google—and passes authentication—it’s far more likely to succeed. Plus, it was Google’s own authenticated domains that were exploited as the apparent source of the messages.

The body content was also carefully crafted to stay within the bounds of what the original DKIM signature would allow. This required a deep understanding of how DKIM works and how much leeway a signature provides for message modification.

Finally, by embedding the phishing link within the body of a replayed, signed message, the attackers sidestepped common detection rules that look for suspicious URLs in unauthenticated emails.

This is a classic example of what makes email security so hard: the very signals defenders are trained to trust can be exploited to deliver attacks that are nearly impossible to distinguish from the real thing.

Defending Against Authenticated Phishing Campaigns

This campaign underscores a difficult truth: attackers don’t need to break authentication—they can just abuse it.

Stopping attacks like this requires moving beyond static signals and signature-based detection. It requires understanding what is normal—who typically sends alerts, what those alerts look like, and how employees usually engage with them.

Abnormal’s behavioral AI identifies threats by baselining known-good behavior across your organization and flagging deviations, regardless of whether the email passes DKIM or not. That means it can detect malicious messages that look legitimate on the surface but deviate from normal sender behavior, language patterns, or intent.

As attackers get smarter, security must too. Because when email authentication is no longer enough, behavior is the only signal that truly matters.

For even more insights into the threat landscape and predictions for where it’s headed, download our report, Inbox Under Siege: 5 Email Attacks You Need to Know for 2025.

Get the Report
Replay, Reuse, and Rob: How Attackers Exploit DKIM and Turn Google OAuth Alerts into Phishing Lures

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More
B Pig Butchering
Learn about pig butchering fraud, a new threat to organizational security. Explore operational tactics, warning signs, and strategies to safeguard your business.
Read More
B Gamma Attack Story Blog
Attackers exploit Gamma in a multi-stage phishing attack using Cloudflare Turnstile and AiTM tactics to evade detection and steal Microsoft credentials.
Read More
B Proofpoint Customer Story 16
With Abnormal’s behavioral AI, a top healthcare solutions provider addressed gaps left by Proofpoint, automated workflows, and saved 335 SOC hours monthly.
Read More
B Phishing Australia
Attackers rely on the trust currency of corporate email to launch highly personalised phishing attacks. Luckily, a revolution in email security means humans are no longer the last line of defence.
Read More