{"id":100994,"date":"2025-08-26T11:30:05","date_gmt":"2025-08-26T07:30:05","guid":{"rendered":"https:\/\/techxmedia.com\/en\/?p=100994"},"modified":"2025-08-26T11:30:07","modified_gmt":"2025-08-26T07:30:07","slug":"google-classroom-abused-in-major-phishing-campaign","status":"publish","type":"post","link":"https:\/\/techxmedia.com\/en\/google-classroom-abused-in-major-phishing-campaign\/","title":{"rendered":"Google Classroom Abused in Major Phishing Campaign"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Check_Point\">Check Point<\/a> researchers have revealed a large-scale phishing campaign exploiting Google Classroom. The platform is trusted by millions of educators and students worldwide.<\/p>\n\n\n\n<p>The company reported that attackers launched five coordinated waves in just one week. They distributed more than 115,000 phishing emails targeting 13,500 organizations across several industries. Victims were located in Europe, North America, the <a href=\"https:\/\/techxmedia.com\/en\/?s=Middle+East%2C+\">Middle East,<\/a> and Asia.<\/p>\n\n\n\n<p>Attackers abused Google Classroom invitations to trick users. The fake invites contained unrelated offers, such as product reselling and SEO services. Each message pushed recipients to contact scammers via WhatsApp, a tactic often linked to fraud.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"870\" height=\"443\" src=\"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/08\/image.png\" alt=\"\" class=\"wp-image-100995\" style=\"width:566px;height:auto\" srcset=\"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/08\/image.png 870w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/08\/image-300x153.png 300w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/08\/image-768x391.png 768w\" sizes=\"auto, (max-width: 870px) 100vw, 870px\" \/><\/figure><\/div>\n\n\n<p>\u2022 Scale: 115,000 phishing emails sent between August 6\u201312, 2025<br>\u2022 Targets: 13,500 organizations across multiple sectors<br>\u2022 Method: Fake Google Classroom invites with WhatsApp contact links<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"704\" src=\"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/08\/image-1.png\" alt=\"\" class=\"wp-image-100996\" style=\"width:578px;height:auto\" srcset=\"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/08\/image-1.png 975w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/08\/image-1-300x217.png 300w, https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/08\/image-1-768x555.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p>Check Point revealed that attackers bypassed traditional defenses by using Google Classroom\u2019s trusted infrastructure. Security systems often treat legitimate Google services as safe, allowing many phishing emails to slip through filters before detection.<\/p>\n\n\n\n<p>The campaign was blocked by Check Point Harmony Email &amp; Collaboration. The company announced that its SmartPhish technology automatically detected and prevented most of the attacks. Extra security layers stopped the remaining messages from reaching inboxes.<\/p>\n\n\n\n<p>Experts warned that cybercriminals continue to weaponize legitimate services. They advised organizations to deploy multi-layered defenses, monitor cloud applications, and train employees to recognize suspicious invitations.<\/p>\n\n\n\n<p>Check Point added that advanced, AI-powered detection is critical. The incident highlights how phishing campaigns are evolving and why companies must protect both email and collaboration tools.<\/p>\n\n\n\n<p>David Meister, Global Head of MSSP at Check Point Software Technologies, explains: \u201cAttackers are exploiting the very platforms people trust the most. This campaign shows that even tools from brands as trusted as Google can be weaponized, and organizations must secure them accordingly.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check Point researchers have revealed a large-scale phishing campaign exploiting [&hellip;]<\/p>\n","protected":false},"author":58,"featured_media":101002,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1595,9621],"tags":[1051],"contributor":[9732],"class_list":["post-100994","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-emerging-technologies","tag-vendors","contributor-news-desk"],"featured_image_src":"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2025\/08\/checkpoint_Artboard-1-copy-20_Artboard-1-copy-20.jpg","author_info":{"display_name":"Lubna","author_link":"https:\/\/techxmedia.com\/en\/author\/lubna\/"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/100994","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/users\/58"}],"replies":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/comments?post=100994"}],"version-history":[{"count":1,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/100994\/revisions"}],"predecessor-version":[{"id":100997,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/100994\/revisions\/100997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media\/101002"}],"wp:attachment":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media?parent=100994"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/categories?post=100994"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/tags?post=100994"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/contributor?post=100994"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}