{"id":289978,"date":"2024-10-14T18:59:53","date_gmt":"2024-10-14T16:59:53","guid":{"rendered":"https:\/\/sftarticles.wpenginepowered.com\/es\/?p=342137"},"modified":"2025-07-01T15:51:39","modified_gmt":"2025-07-01T22:51:39","slug":"an-ai-scam-campaign-is-targeting-all-gmail-users-how-they-can-hack-you-if-youre-not-careful","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/an-ai-scam-campaign-is-targeting-all-gmail-users-how-they-can-hack-you-if-youre-not-careful\/","title":{"rendered":"An AI scam campaign is targeting all Gmail users: how they can hack you if you&#8217;re not careful"},"content":{"rendered":"\n<p>Hackers may have found a new tactic to deceive Gmail users through a <strong>\u201csuper-realistic AI scam call.\u201d<\/strong> Far from being \u201cthe typical scam,\u201d this new scam campaign poses <strong>a threat even to the most experienced users<\/strong>.<\/p>\n\n\n<div class=\"sc-card-starred-link\">\r\n  <div class=\"sc-card-starred-link__body\">\r\n    <div class=\"sc-card-starred-link__row clearfix\">\r\n      <div class=\"sc-card-starred-link__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-starred-link__img\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/3\/2024\/09\/newsletter.png?GoogleAccessId=wp-stateless%40kubertonic.iam.gserviceaccount.com&Expires=1776878208&Signature=VnVKV7kIlCQqTQIUeSqD2f40QvcSipkEYtElc2u1nU6K5Wp0wVgkiYSSUY1h9XdigFykB2nomiaxl5nK7kesrsGRP1J7v5qhP%2Fm4FW%2FjK0XUQIfaDd5wNs6JlmI01XGLEKiTQCe6k8%2BYa8Bgbe4IKtVzhdEA%2FQ40bn6d2hcxS2gfsToJ1V%2FlP3TGEGmuIgFgPbFpyswpVrXHds5slEjt46jJY60BqIZ%2FrYFdSd4ekAi74aCGk%2BdTyxu0GTq3hjGaUTSfwpi7TvPNe4T7wGwEVh%2BSmWhESUcjtFUxpDWwBWmb8biF2hmjJ%2BfG79%2FhHRQi3eja4QbkDquIxM4R1YjFMg%3D%3D\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-starred-link__col-title\">\r\n        <p class=\"sc-card-starred-link__title\">Subscribe to the Softonic newsletter and get the latest in tech, gaming, entertainment and deals right in your inbox.<\/p>\r\n        <a class=\"sc-card-starred-link__button\" href=\"https:\/\/softonic.beehiiv.com\/subscribe\" target=\"_blank\" rel=\"noopener noreferrer sponsored\">Subscribe (it's FREE) \u25ba<\/a>\r\n      <\/div>\r\n    <\/div>\r\n    <a class=\"sc-card-starred-link__link\" href=\"https:\/\/softonic.beehiiv.com\/subscribe\" target=\"_blank\" rel=\"noopener noreferrer sponsored\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p><strong>Sam Mitrovic<\/strong>, a consultant at <strong>Microsoft<\/strong>, shared in <a href=\"https:\/\/sammitrovic.com\/infosec\/gmail-account-takeover-super-realistic-ai-scam-call\/\" target=\"_blank\" rel=\"noopener nofollow\" title=\"\">a blog post<\/a> how he was the victim of a scam attempt using this new tactic. It all started with <strong>a notification to approve the recovery of his Gmail account<\/strong>, a classic phishing technique designed to lead users to fake portals where hackers can steal their credentials. Although Mitrovic declined the request, about 40 minutes later <strong>he received a missed call supposedly from Google Sydney<\/strong>.<\/p>\n\n\n\n<p>The scam continued a week later with <strong>another account recovery request<\/strong>, and this time Mitrovic decided to answer the call he received shortly after. On the phone, a supposed American man, claiming to work for Google&#8217;s support service, <strong>warned him about suspicious activity on his account and that an attacker had downloaded his data<\/strong>. This raised alarms for Mitrovic, who quickly searched Google for the phone number of the call. Although the number seemed legitimate, he decided to remain skeptical and asked to be sent an email.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2024\/07\/thumb-scam-computer-ordenador.jpg\" alt=\"\" \/><\/figure>\n<\/div>\n\n\n<p>When the message arrived in his inbox, everything seemed correct, except for one small detail: <strong>an email address in the &#8220;to&#8221; field that did not belong to Google<\/strong>. The scam became more evident when the interlocutor repeated a &#8220;Hello&#8221; that sounded suspiciously perfect. &#8220;At that moment I realized that <strong>it was an AI voice<\/strong>,&#8221; Mitrovic recounted, upon noticing the scam.<\/p>\n\n\n\n<p>\u201cScams are becoming more sophisticated, more convincing, and are deployed on a larger scale,\u201d stated Mitrovic. For this reason, the consultant emphasizes <strong>the importance of staying alert and conducting basic checks on any communication<\/strong> received by the user.<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Gmail\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/39def43a-99eb-11e6-80e4-00163ed833e7\/498173641\/gmail-logo\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Gmail<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/gmail.en.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/gmail.en.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hackers may have found a new tactic to deceive Gmail users through a &#8220;super-realistic AI scam call.&#8221; Far from being &#8220;the typical scam,&#8221; this new scam campaign poses a threat even to the most experienced users. Sam Mitrovic, a Microsoft consultant, shared in a blog post how he fell victim to an attempted scam with this new tactic. It all started with a notification to approve the recovery of his Gmail account, a classic phishing technique designed to lead users to fake portals where hackers can steal [&hellip;]<\/p>\n","protected":false},"author":9256,"featured_media":289979,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":1},"categories":[1015],"tags":[2339],"usertag":[],"vertical":[],"content-category":[6771],"class_list":["post-289978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-app-subdomain-redirectiongmail","content-category-ai"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/289978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9256"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=289978"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/289978\/revisions"}],"predecessor-version":[{"id":311186,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/289978\/revisions\/311186"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/289979"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=289978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=289978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=289978"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=289978"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=289978"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=289978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}