BlockBeats news, on April 20, Slow Mist founder Yu Xian stated on social media that the previous ENS chief developer was targeted in a phishing attack that exploited a vulnerability in Google's infrastructure. The phishing gang deceived users by disguising as official Google phishing emails, tricking users into being targeted by law enforcement. Although Google has implemented countermeasures, today this phishing gang has launched a new round of phishing attacks, continuing to lure users to a 'google.com' subdomain, inducing users to disclose their account passwords and immediately add a Passkey.

BlockBeats previously reported that on April 16, ENS chief developer nick.eth stated that he had encountered an extremely complex phishing attack that exploited a vulnerability in Google's infrastructure, but Google refused to fix the vulnerability. He indicated that the attack emails appeared very genuine, passing DKIM signature verification, and were displayed normally in Gmail, alongside other legitimate security warnings. The attackers utilized Google's 'site' service to create a trustworthy 'support portal' page, as users would see 'google.com' in the domain name and mistakenly believe it was safe, hence users need to remain cautious.