Cybercriminals Exploit Google Cloud Storage to Bypass Email Security Filters
In early March 2026, cybersecurity researchers uncovered a sophisticated phishing campaign that leverages Google Cloud Storage (GCS) to host malicious redirect links. By utilizing a trusted Google-owned domain, attackers have successfully circumvented standard email security measures, allowing fraudulent emails to reach unsuspecting recipients without triggering alarms.
Discovery of the Campaign
The campaign was identified when security analysts observed an influx of phishing emails directing users to URLs hosted on `storage.googleapis.com`. Over 25 distinct phishing emails targeted a single user account, all leading to the same destination. This pattern indicated a coordinated effort utilizing a single piece of cloud infrastructure controlled by the attackers.
Through meticulous inbox monitoring and SMTP header analysis, researchers traced the phishing pathways back to a specific GCS bucket named whilewait, containing a file titled `comessuccess.html`. This file served as the redirect mechanism for the malicious operation.
Tactics Employed by Attackers
The phishing emails employed various social engineering themes to deceive recipients. Some messages falsely alerted users that their cloud storage was nearly full or that their antivirus subscription had expired. Others enticed victims with fake prize notifications from well-known brands such as T-Mobile, Lowe’s, and State Farm. Despite the differing themes, all emails directed victims to the same GCS-hosted link, which then seamlessly redirected their browsers to external malicious sites.
This strategy signifies a shift in attacker methodologies, moving away from easily identifiable suspicious domains to exploiting trusted cloud platforms. By hosting malicious content on reputable domains like `storage.googleapis.com`, attackers increase the likelihood of bypassing email security tools that typically do not flag such domains.
Mechanism of the Redirect Infrastructure
The success of this campaign hinges on how Google Cloud Storage manages publicly accessible files. Attackers create a GCS bucket and upload an HTML file, making it accessible via a `storage.googleapis.com` URL—a domain generally deemed legitimate by email security gateways. Additionally, these phishing emails pass SPF and DKIM authentication checks, further reducing the chances of being flagged by spam filters.
The whilewait bucket functions as the attacker’s staging area within a Google Cloud project. The `comessuccess.html` file within it acts as a script-heavy redirector, swiftly transferring the victim’s browser to an external malicious site. This redirection occurs almost instantaneously, making it difficult for users to realize they have left Google’s infrastructure.
Once redirected, victims encounter seemingly routine charges—often small shipping fees or service renewals related to the original email’s lure. This stage is designed to harvest credit card information. Any payment details entered are captured directly by the attackers, leading to immediate financial theft. The initial link’s appearance as a Google domain adds a layer of credibility, making it harder for users to detect the threat.
Recommendations for Users and Security Teams
To mitigate the risks associated with such phishing campaigns, users and security teams should adopt the following measures:
1. Vigilance with Unsolicited Emails: Be cautious of emails urging immediate action regarding storage limits, subscriptions, or prizes, regardless of how familiar the link appears.
2. Scrutinize Email Links: Exercise caution with emails containing links that start with `storage.googleapis.com`. Understand that these are not direct communications from Google but files hosted by third parties using Google’s infrastructure.
3. Verify Sender Information: Carefully check the sender’s email address. Phishing emails in this campaign often use randomized alphanumeric strings in the From field, indicating automated mass fraud.
4. Report Suspicious Activity: Security teams should report active GCS buckets used in phishing to the Google Cloud Abuse Team. Since multiple emails in this campaign rely on a single shared bucket, a successful takedown report targeting the whilewait bucket could dismantle the entire phishing network.
By remaining vigilant and implementing these practices, users and organizations can better protect themselves against evolving phishing tactics that exploit trusted cloud services.