Gmail Users Targeted by Sophisticated Phone Number Exploitation Scam
Gmail Phone Number Scam Targets Users via SMS Phishing

Gmail Users Face New SMS Phishing Scam Exploiting Personal Phone Numbers

A sophisticated new phishing scam is actively targeting Gmail users by exploiting their own mobile phone numbers through deceptive text messages. The scheme, which first gained attention through reports on Reddit, involves fraudulent SMS messages that appear to originate from 'Gmail from Google,' falsely warning recipients that their account has been compromised by unauthorized access attempts.

How the Deceptive Scheme Operates

The malicious text messages typically reference concerning activity such as sign-on attempts from foreign IP addresses in locations like Venezuela or Bangladesh, deliberately designed to heighten alarm and prompt immediate action. Included within these messages is a link labeled 'Recover Account' that directs users to a counterfeit login page. When unsuspecting victims enter their Gmail password on this fake page, scammers successfully capture their credentials.

In more advanced iterations of this attack, cybercriminals combine stolen login information with personal details like phone numbers to execute SIM swap attacks. Through social engineering tactics, attackers may convince mobile carriers to transfer a victim's phone number to a SIM card under their control. This maneuver potentially grants them access to SMS-based two-factor authentication codes, creating a pathway for complete account takeover.

Wide Pickt banner — collaborative shopping lists app for Telegram, phone mockup with grocery list

Immediate Protective Measures Recommended by Experts

Cybersecurity experts emphasize that users who suspect they have been targeted must take several immediate protective actions:

  1. Change your Google password immediately to a strong, unique combination that has not been used elsewhere.
  2. Enable two-factor authentication (2FA) and, where possible, replace SMS-based verification with more secure authenticator apps or hardware security keys.
  3. Update passwords on all other accounts that shared the same compromised credentials, as password reuse dramatically increases the risk of widespread account takeover.
  4. Implement additional protections with your mobile carrier by inquiring about security options such as SIM PINs, account passcodes, port freezes, or number locks to prevent unauthorized SIM transfers.

Experts strongly recommend using password managers to generate and store unique, strong passwords for each online account, significantly reducing vulnerability to credential stuffing attacks.

Ongoing Monitoring and Reporting Procedures

Beyond initial protective steps, users should actively monitor account activity and enable login alerts across all services. Many platforms provide notifications for unusual login attempts, and early detection can prevent unauthorized access. Victims of these phishing attempts should report incidents to both Google and relevant authorities like the Federal Trade Commission to help track these scams and warn other potential targets.

While changing your phone number is generally unnecessary if proper carrier security measures are in place, experts note that if you experience service interruptions that might indicate a SIM swap attempt, changing your number could become a necessary precaution.

Connection to Recent Gmail Feature Exploitation

This latest scam follows cybersecurity warnings issued in January regarding phishing attempts exploiting a new Google feature that allows users to create new email addresses while maintaining old ones as aliases. Scammers have been sending fraudulent emails about this address change feature, often appearing convincing because they originate from legitimate-looking Google addresses like no-reply@accounts.google.com.

These messages typically claim a 'Gmail address change' or request security confirmation, with links that mimic official Google support pages but actually lead to fake websites hosted on sites.google.com. Successful attacks through this method can grant access not only to Gmail but also to all connected Google services including Drive, Photos, Calendar, and any third-party accounts linked through Google login credentials.

Pickt after-article banner — collaborative shopping lists app with family illustration

Security professionals advise users to delete any suspicious emails immediately and avoid clicking on links or sharing personal information in response to unsolicited messages, regardless of how legitimate they may appear.