Gmail Phishing Attack Steals Credentials
- Nik Lipor
- Aug 20
- 1 min read

A sophisticated phishing campaign targeting Gmail users has emerged, leveraging legitimate Microsoft Dynamics infrastructure to evade security measures and steal login credentials. The attack begins with a deceptive email that mimics an official Microsoft login page, prompting users to sign in. Once users enter their credentials, the phishing site captures this information and redirects them to a secondary page that requests two-factor authentication (2FA) codes, further compromising account security.
The attack’s complexity lies in its multi-layered approach, which exploits trusted platforms to bypass email filters and antivirus software. By using Microsoft Dynamics URLs, the phishing emails appear legitimate, increasing the likelihood of user interaction. The campaign also employs advanced techniques like session cookie theft, allowing attackers to maintain access to compromised accounts even after password changes, posing a significant threat to user data and privacy.
To protect against this scam, users are advised to scrutinize email senders, avoid clicking on suspicious links, and enable 2FA for added security. Regularly monitoring account activity and using strong, unique passwords can further reduce risks. Staying vigilant and skeptical of unsolicited requests for login information is critical in mitigating the dangers of such sophisticated phishing attacks.
You can read more information about this threat here.




Comments