How are bad actors using Google Forms to send spam?
Michael Ko
Co-founder & CEO, Suped
Published 22 Apr 2025
Updated 17 Aug 2025
6 min read
Google Forms is a powerful and widely used tool for creating surveys, quizzes, and data collection forms. Its simplicity and integration with the Google ecosystem make it incredibly convenient for legitimate purposes. However, these very strengths also make it an attractive target for bad actors looking to exploit its trustworthiness.
The challenge lies in the fact that emails originating from Google Forms are sent from Google's own highly reputable servers. This means they pass standard email authentication checks like SPF and DKIM, and often DMARC, giving them a high degree of legitimacy in the eyes of email service providers. This can lead to these malicious emails bypassing many conventional spam filters, landing directly in your inbox.
We've observed a recurring pattern where scammers leverage this inherent trust, creating convincing phishing campaigns and unsolicited messages that appear to be from Google or other trusted entities. Understanding their methods is crucial for protecting yourself and your organization from these deceptive tactics.
How bad actors exploit Google Forms
Bad actors employ Google Forms in various ways to achieve their malicious goals. One common method is using the forms to create fake login pages for phishing. They mimic legitimate services, like online banking, cryptocurrency exchanges, or even Google itself, to trick users into entering their credentials. Since the form itself is hosted on docs.google.com, it appears highly trustworthy to the average user.
Another tactic involves using forms for direct spam campaigns or distributing malware. Spammers can leverage Google Forms' quiz feature, where the system sends an email notification to respondents, often with a "Release scores" option. Bad actors manipulate this feature to send unsolicited emails, knowing these messages will originate from Google's servers. These often contain links to malicious websites or encourage users to download infected files, posing a significant security risk.
I've also seen instances where bad actors use Google Forms as a fake unsubscribe mechanism in illicit marketing emails. When a user clicks an "unsubscribe" link that leads to a Google Form, they're not unsubscribing. Instead, they're inadvertently confirming their email address is active, making it a prime target for more spam or phishing attacks.
Legitimate versus malicious Google Forms
Legitimate Google Forms use
Purpose: Surveys, quizzes, event registrations, data collection for genuine business or educational purposes.
Content: Clear, relevant questions or information, typically free of urgent demands or suspicious links.
Source: Shared directly by a known sender, often through Google Workspace or a known organization.
Requested information: Information that aligns with the stated purpose, usually not sensitive login credentials or financial data.
Abusive Google Forms use
Purpose: Phishing, malware distribution, identity theft, confirming active email addresses for spam lists, or spreading misinformation.
Content: Urgent calls to action, suspicious offers, security warnings, or requests for sensitive information outside the form itself.
Source: Unexpected emails, often from unknown senders, or cleverly spoofed addresses trying to appear legitimate.
Requested information: Prompts for usernames, passwords, credit card numbers, or other highly sensitive personal data.
Why Google Forms are effective for bad actors
The primary reason Google Forms are so appealing to bad actors is their inherent trustworthiness. Emails originating from Google's infrastructure typically boast strong email authentication results, meaning they pass SPF, DKIM, and DMARC checks with the google.com domain. This makes it extremely difficult for traditional spam filters, which rely heavily on these authentication signals, to flag them as malicious. The sheer volume of legitimate Google-sent emails also makes it harder to distinguish the malicious ones.
Another factor is the ease of use. Google Forms provides a user-friendly interface that requires no technical expertise to create a convincing-looking form. This low barrier to entry allows even entry-level scammers to quickly set up sophisticated phishing campaigns. They can leverage pre-made design templates, adding to the illusion of legitimacy, and modify them slightly to fit their scam narrative.
Furthermore, the ubiquitous nature of Google's services means many users are familiar with and trust Google's branding and interface. This familiarity can disarm recipients, making them less likely to scrutinize an email or form that appears to come from a trusted source. This makes it easier for bad actors to trick users into providing sensitive information or interacting with harmful content without raising immediate suspicion.
Detecting and reporting abuse
Detecting these types of attacks requires a keen eye and a healthy dose of skepticism, especially since even legitimate emails can sometimes go to spam. One of the most effective strategies is user education. Training your employees and users to recognize the common red flags of phishing and spam is paramount. This includes looking for generic greetings, urgent language, unsolicited requests for sensitive data, and suspicious links, even if the sender appears to be legitimate.
Always verify the sender and the context. If you receive an unexpected Google Form, especially one asking for sensitive information, do not click on any links. Instead, navigate directly to the official website of the service mentioned in the email (e.g., your bank's website, Google's official site) and log in from there. If there's a legitimate request, you'll find it within your account.
For organizations, implementing robust email security measures is critical. While Google-authenticated emails can slip through, a comprehensive approach involving advanced threat protection, DMARC monitoring, and user training significantly reduces risk. If you suspect a Google Form is being used maliciously, it's important to report the abuse to Google directly. This helps them identify and shut down malicious forms.
Regularly monitoring your Google Postmaster Tools data can also provide insights into unusual email activity related to your domain, even if it's spoofing. Understanding how bad actors operate helps you to stay one step ahead.
Best practices for protecting against Google Forms spam
Educate users: Train staff and users to recognize the signs of phishing, regardless of the sender.
Verify legitimacy: Always navigate directly to official websites instead of clicking links in suspicious emails.
Report abuse: Report malicious Google Forms to Google to aid in their takedown.
Implement DMARC: Ensure strong DMARC policies are in place to prevent your own domain from being spoofed.
Views from the trenches
Best practices
Always scrutinize unexpected emails, even if they appear to come from trusted services like Google.
Implement multi-factor authentication (MFA) on all accounts to add an extra layer of security.
Regularly review your email authentication settings, like SPF, DKIM, and DMARC, to ensure they are correctly configured and preventing spoofing.
Use a DMARC monitoring service to gain visibility into your email ecosystem and identify unauthorized use of your domain.
Keep your operating system and software updated to patch known vulnerabilities that attackers could exploit.
Common pitfalls
Clicking on suspicious links in emails, even those that seem to originate from a legitimate Google Forms address, can lead to compromise.
Assuming that all emails from Google's servers are legitimate, overlooking the potential for abuse of their services.
Not reporting suspicious Google Forms or phishing attempts, allowing bad actors to continue their operations.
Lack of consistent user training on identifying and avoiding phishing and social engineering tactics.
Failing to monitor DMARC reports, which can reveal instances of your domain being spoofed, even if Google Forms is not directly involved.
Expert tips
If an email seems off, check the full headers for discrepancies in the sender or return-path, even if it passes initial authentication.
Look for small grammatical errors or awkward phrasing, which are common tells of phishing attempts.
Be wary of any Google Form asking for login credentials outside of a direct, expected interaction.
Use a reputable email security solution that offers advanced threat detection beyond standard authentication checks.
For organizations, consider a clear incident response plan for suspected phishing attacks involving Google Forms.
Expert view
Expert from Email Geeks says they recently encountered a very convincing phishing email spoofing a Google notification that bypassed Gmail's filters due to being authenticated by `google.com`.
2024-12-29 - Email Geeks
Expert view
Expert from Email Geeks says they observed how bad actors are once again using Google Forms to send spam, leveraging Google's legitimate mail infrastructure.
2025-01-15 - Email Geeks
Staying ahead of Google Forms abuse
The abuse of Google Forms by bad actors highlights a persistent challenge in email security: how to filter out malicious content when it originates from a trusted source. As long as these services are accessible and widely used, spammers and phishers will continue to find ways to exploit their inherent legitimacy.
For individuals, vigilance and education are your strongest defenses. Always question unexpected requests for information, especially if they demand urgent action or involve sensitive data. For organizations, a multi-layered security approach, combining advanced email filtering with continuous DMARC monitoring and user awareness programs, is essential. Understanding the tactics of these bad actors enables us to build more resilient defenses.
While Google works to combat these abuses, the responsibility also lies with users and organizations to stay informed and proactive. By doing so, we can collectively reduce the impact of these deceptive spam and phishing campaigns that weaponize otherwise legitimate tools.