Key Takeaways
Nick Johnson, a senior developer who helped build Google App Engine, was targeted by “an extremely sophisticated phishing attack” that used Google services to deliver a fake subpoena alert.
Johnson quickly informed other users about the intricate details of the attack on X. What seemed suspicious to a developer could have seemed normal to the average user.
This article explains what a Google phishing scam is, specifically using what seemed to be a credible subpoena alert. It covers how scammers use different tactics, common red flags to spot real examples of phishing attacks, and tips to protect users. It also outlines best security practices for staying safe in Web3.
A fake subpoena scam is a phishing attack where scammers impersonate legal authorities, such as courts, law enforcement, or even companies, to trick individuals into revealing personal information, making payments, or taking harmful actions. These scams can also occur when scammers pose as trusted companies or entities to deceive users into disclosing sensitive details.
A sophisticated phishing campaign is exploiting Google’s own tools to deceive users into surrendering their credentials. Attackers are sending deceptive emails that appear to come from “[email protected],” warning recipients of a fake subpoena related to law enforcement accessing their Google Accounts.
The scam uses Google’s Sites platform to create convincing phishing emails and spoofed web pages. Cleverly bypassing DKIM (DomainKeys Identified Mail) security checks, the attackers craft their messages to appear legitimate by embedding phishing content in the app name field of a Google tool, which then autofills into legitimate-looking emails sent by Google.
In subpoena scams, victims receive an email or message that appears to be an official subpoena or legal notice. The message often threatens severe consequences, like fines, legal action, or arrest, if the recipient fails to comply.
These emails typically include links to fraudulent websites or attachments that seem urgent. The fake sites may prompt victims to enter sensitive information, such as login credentials, social security numbers, or financial details.
Google itself doesn’t issue subpoenas. However, Google can receive a subpoena and be compelled to provide user data.
If your Google account data is requested by law enforcement or a court via subpoena, court order, or warrant, Google may be legally required to provide certain information. In some cases, they are also required to notify you—especially if:
This notification serves to inform you that your data has been requested, and sometimes gives you a chance to challenge it in court before the data is handed over.
Johnson explained that he first noted a valid, signed email that “really was sent from [email protected]. It passes the DKIM (DomainKeys Identified Mail) signature check, and Gmail displays it without any warnings — it even puts it in the same conversation as other, legitimate security alerts.”
The subpoena phishing email used Google’s infrastructure to appear authentic, allowing it to bypass spam filters and land directly alongside real security notifications.
Johnson revealed that the subpoena attack directed him to a fraudulent portal hosted on a trusted Google subdomain. The attackers used Google Sites, an older platform that allows user-generated pages under the google.com domain.
By exploiting Google Sites, the attackers made the fake portal seem credible, leaving users with little reason to doubt its legitimacy.
Clicking on links such as “Upload additional documents” or “View case” redirected users to a page that closely resembled Google’s real login screen. Johnson explained that the main giveaway was the domain itself:
“The only hint it’s a phish is that it’s hosted on http://sites.google.com instead of http://accounts.google.com .”
This subtle domain difference resembled typosquatting, a common tactic where attackers rely on slight variations in legitimate URLs to deceive users. It was the only visible clue that the login page was a trap designed to steal account credentials.
Here are 10 warning signs to help you identify and avoid this scam:
Spotting even one of these red flags should prompt users to stop interacting immediately and verify the source through official channels.
A legitimate subpoena notice from Google is sent from an official Google email address, typically ending in @google.com, such as [email protected]. The language used is formal and precise, often referencing the specific legal process involved—such as a subpoena, court order, or search warrant.
These notices will clearly identify the law enforcement agency or court requesting the information, often including a case number, jurisdiction (like the Northern District of California), and a brief summary of the legal basis for the request.
Google’s legal notice will also inform the user of any rights they may have to challenge the data request, including a specific response deadline. If no gag order is in place, Google may allow time for legal objections before disclosing any information.
The email typically contains contact information for Google’s Legal Support team, and may include links to official support resources hosted on Google-owned domains like support.google.com.
Crucially, a real subpoena notice will never urge users to click suspicious links, request access to cryptocurrency wallets, ask for passwords, or demand immediate action under pressure. Instead, it provides clear next steps and encourages users to seek legal counsel if needed.
The following are some recent examples of how scammers have exploited crypto users and deceived them into losing funds:
Scammers targeted domain owners with fake “expiration” emails and directed them to counterfeit renewal sites. Victims unknowingly lost funds by providing sensitive information on these fraudulent sites. Attackers took advantage of the high value placed on Ethereum Name Service (ENS) domains by impersonating official notifications of domain expirations.
Scammers registered domains mimicking legitimate wallet addresses. Their goal was to trick users into sending funds to these fraudulent addresses. Hayden Adams, the founder of Uniswap, raised awareness about the issue and called for better filtering mechanisms in wallet interfaces to help prevent such scams.
To protect your crypto assets from phishing scams, including fake subpoena alerts, you should consider these essential security practices:
When navigating Web3, users must follow these proactive security practices to protect assets and avoid scams:
The main recommendation is to stay informed and educated to avoid scams, including fake subpoena alerts. Users should follow reputable news sources and security blogs to stay ahead of the latest threats.
In summary, some phishing scams, like subpoena phishing attacks, exploit users’ trust to steal funds.
Users must stay vigilant by verifying sources, email and wallet addresses, revoking unnecessary permissions, and using secure practices like hardware and multi-sig wallets.
Keeping software updated and staying informed about emerging threats will help safeguard against these scams in Web3. Keep on educating yourself about tech and the crypto space.
Scammers exploit the trust placed in ENS domains by creating fraudulent addresses that resemble legitimate ones. Users, believing they are interacting with trusted entities, unknowingly send funds to malicious wallets. Subpoena phishing scams target users by mimicking official platforms, typically related to legal authorities, law enforcement, or courts. These scams use fraudulent messages that appear to be subpoenas, legal notices, or court orders to trick recipients into taking action, such as clicking links or providing sensitive information. Scammers often use social media platforms to impersonate legitimate projects or individuals. By posting fake offers or phishing links, they prey on users’ trust in these platforms, making it easy for them to lure victims into clicking on malicious links.How do ENS scams specifically target Ethereum users?
What is the difference between subpoena phishing scams and regular phishing scams?
What role does social media play in spreading ENS phishing scams?