Seed Poisoning: It’s not always about malicious Phishing URLs
The email lure is designed to convince recipients that they need to migrate their cryptocurrency wallet to a new one to improve security - often...
Attackers are abusing Google's Application Integration service to send phishing emails from authentic @google.com addresses. We've observed this technique being used in the wild to target organizations with highly convincing lures.
The attack leverages Google's Application Integration infrastructure to send emails from `noreply-application-integration@google.com`. Because these messages originate from Google's own servers, they pass SPF, DKIM, and DMARC authentication — making them appear fully legitimate to both email gateways and recipients.

Setting up the email sending workflow in Google's Application Integration service
To maximize credibility, attackers pair these authenticated emails with links pointing to Google-hosted domains like `storage.cloud.google.com`, `sites.google.com`; and `share.google` and use Google's recognizable email templates for their messages. The result is an email from Google, with links to Google, that passes all standard email authentication checks.
To evade detection, attackers use multi-hop redirect chains that bounce through multiple legitimate services. A typical chain might look like this:
Google domain (e.g., share.google, sites.google.com)
→ Microsoft OAuth (login.microsoftonline.com)
→ Attacker-controlled page (e.g., AWS S3 bucket)
Each hop uses trusted infrastructure — Google, Microsoft, AWS — making the attack difficult to detect or block at any single point. Regardless of the entry point, victims eventually land on the Microsoft 365 login page, revealing the attackers' primary target: M365 credentials.
Depending on the victim's role, the attack serves one of two purposes:
For most victims, this is straightforward credential theft. The OAuth flow requests the scope https://management.core.windows.net//.default, but most targeted recipients don't have Azure management privileges. Instead, we believe the OAuth prompt serves as a mechanism to capture and validate credentials through Microsoft's legitimate login flow — even if the victim lacks Azure permissions, the attacker confirms the password is valid.

For victims with cloud privileges, this becomes an OAuth consent attack (also known as "illicit consent grant"). The attackers trick victims into granting a malicious Azure AD application access to their cloud resources — gaining access to Azure subscriptions, VMs, storage, and databases via delegated permissions that persist through access and refresh tokens.
This attack succeeds where traditional phishing fails:
For many security tools and users, these signals indicate a trustworthy message.
Security teams should consider the following:

Fake File Sharing notification

Fake voicemail notification
The email lure is designed to convince recipients that they need to migrate their cryptocurrency wallet to a new one to improve security - often...
Candid Wüest