Cybersecurity researchers at Malwarebytes Labs have exposed a sophisticated new Gmail scam where fraudsters send fake Google security alerts via phishing emails, texts, and pop-ups, tricking users into a deceptive four-step verification process that harvests login credentials, GPS locations, contacts, and other sensitive data for account takeovers.
Disguised as routine checkups, these alerts mimic Google’s official pages to create urgency, prompting victims to install malicious “security tools” that grant hackers real-time access to Gmail and linked services—Corey Donovan, president of Alta Technologies, warns legitimate checks never come unsolicited or demand downloads, urging users to close suspicious prompts immediately and verify via official Google account pages instead.
The scam’s rise amplifies risks during travel, where public Wi-Fi hotspots—especially “evil twin” fakes like slight misspellings of “Airport_Free_WiFi”—enable interception of banking details, emails, and malware installs; Donovan advises disabling auto-connect, using VPNs for HTTPS sites only, avoiding logins altogether, and crafting strong passwords with mixed characters plus two-factor authentication.
Shoulder surfing on public transport and outdated devices compound threats, as fraudsters glimpse screens or exploit unpatched vulnerabilities—keeping phones updated with post-update privacy reviews limits app access to location or commutes, while skipping work emails in view maintains confidentiality on the go.
Nigeria’s heavy reliance on digital banking and crypto heightens vulnerability, as scammers exploit rushed travellers; Donovan stresses: “Cybercriminals target busy airports and stations knowing guards drop—stay cautious, update devices, lock privacy, and never rush links to protect against these advanced breaches.”
![]()


































