Connect with us
DAPA Banner

Crypto World

Kaspersky Uncovers Google Tasks Phishing To Steal Credentials

Published

on

An email sent by the attackers via Google Tasks

Editor’s note: The following briefing outlines a new phishing campaign uncovered by Kaspersky that hijacks legitimate Google Tasks notifications to steal corporate credentials. The attackers impersonate trusted services, leveraging the @google.com domain and intra-company cues to evade standard filters and pressure users into acting quickly. Victims are invited to click a link and complete a fraudulent employee verification form, exposing sensitive credentials that could grant unauthorized access. This advisory highlights the evolving tactics criminals use to exploit familiar tools and the importance of vigilance in enterprise environments.

Key points

  • Attackers abuse legitimate Google Tasks notifications to steal corporate credentials.
  • The campaign uses the trusted @google.com domain to bypass filters and build trust.
  • Users are directed to a fraudulent employee verification form after clicking a link.
  • The social engineering hinges on urgency and internal process appearance to lower defenses.

Why this matters

By exploiting familiar services, the campaign exploits trust in everyday tools, increasing the likelihood that employees reveal credentials. This approach bypasses many security filters and highlights the need for awareness and layered defenses in organizations. The incident underscores why training, MFA, and robust verification processes are critical as attackers continue to adapt to legitimate platforms.

What to watch next

  • Look for more phishing attempts that imitate enterprise tools via trusted notification channels.
  • Watch for fraudulent forms asking for corporate credentials and verify URLs before interacting.
  • Ensure MFA and mail-server security measures are in place to protect accounts.
  • Report suspicious activity to IT and update security policies as needed.

Disclosure: The content below is a press release provided by the company/PR representative. It is published for informational purposes.

Kaspersky discovers new phishing campaign exploiting Google Tasks notifications to steal corporate credentials

February 26, 2026

Kaspersky has uncovered a new phishing scheme that abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials. By leveraging Google’s trusted @google.com email domain and notification system, attackers bypass traditional email security filters and exploit users’ trust in familiar services.

In this campaign, victims receive an authentic-looking notification from Google Tasks with the subject line “You have a new task.” The message creates the illusion that the recipient’s company has adopted Google’s task management tool, pressuring them to act quickly. The notification often includes elements of urgency, such as a high-priority flag and a tight deadline, to prompt the victim’s immediate response.

Advertisement
An email sent by the attackers via Google Tasks
An email sent by the attackers via Google Tasks

Upon clicking the embedded link, users are directed to a fraudulent form disguised as an “employee verification” page, where they are asked to enter their corporate credentials under the pretense of confirming their status. These stolen credentials can then be used for unauthorized access to company systems, data theft, or further attacks.

“Google’s vast ecosystem of services gets exploited by scammers. The scheme with Google Tasks is part of a broader trend observed before and continuing into 2026, where cybercriminals misuse legitimate platforms to distribute scams and phishing. Notifications originating from legitimate domains naturally evade many spam and phishing filters, while the social engineering aspect – making it seem like an internal company process – lowers the victim’s guard,” comments Roman Dedenok, Anti-Spam Expert at Kaspersky.

Read the article about this tactic on Kaspersky’s blog.

To counter this and similar threats, Kaspersky recommends:

  • Treat unsolicited invitations from any platform with suspicion, even if they appear to come from trusted sources
  • Carefully inspect URLs before clicking
  • Do not call any phone numbers indicated in suspicious emails – if you need to call support of a certain service, it is best to find the phone number on the official webpage of this service
  • Report suspicious emails to the platform provider and use multi-factor authentication for all accounts
  • For corporate users, Kaspersky Security for Mail Server with its multi-layered defense mechanisms powered by machine learning algorithms provides robust protection against a wide range of evolving threats and offers peace of mind to businesses in the face of evolving cyber risks
  • For individual users Kaspersky Premium offers AI-powered anti phishing features designed to help avoid phishing attacks and improve overall cybersecurity

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure and governments around the globe. The company’s comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and nearly 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Risk & affiliate notice: Crypto assets are volatile and capital is at risk. This article may contain affiliate links. Read full disclosure

Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Ethereum Faces $2.5B Long Liquidation Risk If ETH Dips Below $2,100

Published

on

Ethereum Faces $2.5B Long Liquidation Risk If ETH Dips Below $2,100

Ether (ETH) traded lower on Thursday after a fresh knee-jerk reaction to yesterday’s US interest rate decision and a higher inflation outlook.

Key takeaways:

  • ETH dropped 7% to $2,100 on Thursday, liquidating $144 million in longs.

  • A break below $2,000 could trigger over $2.5 billion in additional long liquidations across exchanges.

  • The 50-day moving average around $2,100 is a key level to watch.

Ether risks $2.5 billion long liquidations

Data from TradingView showed 7% daily ETH price losses, with ETH/USD dropping as low as $2,140 on Thursday.

ETH/USD 1-hour chart. Source: Cointelegraph/TradingView

Ether’s correction is accompanied by significant long liquidations across the crypto market totaling $492.8 million over the last 24 hours. More than $144 million in long ETH positions were liquidated with Ether’s move to $2,100.

Total crypto liquidations. Source: CoinGlass

The correction occurred despite another 60,999-ETH purchase by Tom Lee’s Bitmine Immersion Technologies, which now holds roughly 4.6 million ETH, or 3.81% of the total supply.

Related: Ether accumulation data points to a rally toward $2.8K, but there’s a catch

Advertisement

Ether’s decline came amid fresh selling in US-based spot ETH exchange-traded funds (ETFs), which recorded more than $55.5 million in net outflows on Wednesday, snapping a six-day inflow streak, according to data from Farside Investors.

Spot Ether ETF flows table. Source: Farside Investors

Ether’s downward momentum may increase if spot and institutional buyers don’t step back in soon.

Ether’s downside may hinge on the key $2,000 support, as a correction below would trigger over $2.5 billion worth of leveraged long liquidations across all exchanges, CoinGlass data shows.

Cryptocurrencies, Ethereum, Markets, Price Analysis, Tech Analysis, Market Analysis, Ether Price, Ethereum ETF, ETF
ETH exchange liquidation map. Source: CoinGlass

This means a significant amount of bullish bets would get wiped out on a move lower, leaving ETH vulnerable to a sharper downside cascade if bearish momentum takes hold.

ETH price stays sensitive to FOMC risks

Ether’s bearishness today follows the decision by the US Federal Open Market Committee (FOMC) to leave interest rates unchanged after the March 18 meeting.

The chart below shows that the ETH/USD pair has declined after seven of the last eight FOMC meetings, establishing one of the clearest macro-driven fractals in its history.

Advertisement

ETH has set a consistent pattern as it stabilizes or rallies ahead of the meeting, then corrects sharply once the decision and the accompanying commentary hit news wires. 

ETH/USD daily chart. Source: Cointelegraph/TradingView

Typical post-FOMC drawdowns ranged between 16% and 23%, while deeper deleveraging phases pushed ETH price losses to 33%-43%. 

From a technical perspective, Ether remains cautiously bullish despite macro risks. The price is retesting a key support zone near $2,100, which aligns with the upper trendline of an ascending triangle and the 50-day simple moving average (SMA).

ETH/USD daily chart. Source: Cointelegraph/TradingView

Bulls are required to hold ETH above this level to regain their footing. It will then open the path toward the next major resistance at $2,575, where the 100-day SMA is. 

Higher than that, the price could rise toward the measured target of the triangle at $2,700, 24% above the current price.

Conversely, failure to hold above $2,100 would weaken the setup, pushing ETH/USD back toward the triangle’s support line near $2,000, while putting the broader recovery at risk.

Advertisement

As Cointelegraph reported, a close below the 20-day exponential moving average near $2,000 would suggest that the bears are back in control, risking a deeper correction toward the next major support area around $1,800.