Suped

Summary

Bad actors are increasingly leveraging Google Forms as a vector for sending spam and sophisticated phishing emails. This tactic allows malicious messages to originate from Google's own trusted infrastructure, often leading to them bypassing standard email filters. This creates a significant challenge for email recipients and deliverability professionals, as the emails appear to be authenticated and legitimate, making them harder to detect by automated systems and human eyes alike.

What email marketers say

Email marketers and general users frequently encounter the misuse of Google Forms for spam and phishing. Their experiences highlight the surprise and frustration when seemingly legitimate emails, despite their malicious intent, bypass common spam filters and land in the inbox. This perspective often centers on the direct impact of these attacks on user trust and the practical challenges of combating them.

Marketer view

Marketer from Email Geeks observes receiving a very obvious phishing email spoofing a Google notification that was still inboxed in Gmail. They noted that all authenticating domains appeared to be legit, making it difficult to detect.

30 Dec 2024 - Email Geeks

Marketer view

Marketer from Email Geeks questions how bad actors could acquire such an obvious typo domain for malicious purposes, highlighting the surprising nature of the scam.

30 Dec 2024 - Email Geeks

What the experts say

Experts in email deliverability and cybersecurity confirm that Google Forms are a known conduit for spam and phishing. They explain the technical nuances that allow these attacks to succeed, emphasizing the challenge of distinguishing legitimate infrastructure misuse from traditional email blacklist and blocklist spam. Their insights often focus on the methods of exploitation and the broader implications for email security.

Expert view

Expert from SpamResource comments on the growing trend of legitimate service abuse for spam. They suggest that this method leverages the inherent trust users place in well-known brands and their services.

20 May 2024 - SpamResource

Expert view

Expert from Word to the Wise suggests that relying solely on email authentication protocols like SPF or DKIM is insufficient to combat sophisticated phishing attacks. These attacks often originate from legitimate infrastructure.

10 Apr 2024 - Word to the Wise

What the documentation says

Official documentation and security research often provide detailed accounts of how bad actors employ tactics when abusing platforms like Google Forms. These resources offer valuable insights into the technical vulnerabilities and specific strategies used for exploitation, as well as outlining recommended countermeasures and best practices for prevention.

Technical article

Security Expert from DuoCircle notes that threat actors are actively exploiting Google Calendars for phishing attempts. These campaigns send fake meeting invitations that redirect invitees to malicious websites.

25 Mar 2025 - DuoCircle

Technical article

Security Researcher from Cisco Talos Blog states that spammers are exploiting the "Release scores" feature of Google Forms quizzes to deliver email. These malicious emails surprisingly originate directly from Google's own servers.

10 Nov 2023 - Cisco Talos Blog

15 resources

Start improving your email deliverability today

Get started