A highly convincing phishing campaign is abusing DKIM replay techniques to bypass security filters and impersonate Google Security Alerts. The attacker uses previously signed DKIM headers to resend legitimate-looking Google emails and lure victims into entering credentials on spoofed Google Support pages hosted on Google Sites:
Phishing Lure: Claims of legal subpoenas and urgent access requests tied to Google accounts.
Spoofed URLs: sites.google.com/... linking to realistic-looking support case pages.
Payload: Redirects to a fake Google login page stealing credentials under the guise of "Google Legal Investigations Support."