Modern phishing attacks have moved well past broken English and suspicious links. Today’s scams are built around realistic workflows, professional communication, and carefully designed environments that mirror legitimate tools developers use every day. If you work with WordPress, this one is worth knowing about.
How It Started
The attack begins with an email that looks like a client enquiry or a plugin review request. The language is polished, the request is reasonable, and there’s a link to what appears to be a staging environment where the developer is asked to review some work before it goes live. Nothing about it screams “scam.”
The Trap
The staging link loads a convincing project preview, often a real-looking website with dummy content. When the developer clicks through to access the WordPress backend, they’re told the site uses Google authentication for secure access. A familiar Google login prompt appears, asking for their Google account credentials.
This is the moment everything is stolen.
The Google login page is a fake, hosted in a way that mimics Google’s actual OAuth flow right down to the URL structure. Once credentials are entered, the attacker captures them silently and gains access not to a staging site, but to the developer’s entire Google account, including Gmail, Drive, and any connected services.
Why It Worked
Using Google login felt legitimate. Many agencies and hosting platforms do use OAuth-based access. The extra authentication step actually made the scam feel more secure, not less.
The Warning Signs
The staging domain was registered recently. The Google login URL didn’t sit on accounts.google.com. There was no prior relationship with the sender and no way to independently verify the request.
How To Protect Yourself
- Always confirm the Google login URL starts with accounts.google.com before entering anything
- Use a password manager, which won’t autofill on spoofed domains
- Verify unsolicited staging requests through a known contact channel
- Enable two-factor authentication on your Google account
- Check domain ages with a WHOIS lookup before trusting any new link
If the login method feels unexpected, pause and verify before you type a single character.
These attacks are getting harder to spot, and even experienced developers get caught out. If sharing this stops it from happening to even one person, that’s a good enough reason to put it out there. Stay sharp out there and speak to us if you would like to work with us and have Slate in your corner!
