TLDR Scammers used Gmail’s dot alias feature to send fake Robinhood login alert emails that looked completely real Fraudsters created Robinhood accounts with dotTLDR Scammers used Gmail’s dot alias feature to send fake Robinhood login alert emails that looked completely real Fraudsters created Robinhood accounts with dot

Robinhood Users Targeted by Gmail Dot Trick Phishing Attack

2026/04/28 16:41
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

TLDR

  • Scammers used Gmail’s dot alias feature to send fake Robinhood login alert emails that looked completely real
  • Fraudsters created Robinhood accounts with dot-altered email addresses to hijack automated emails
  • HTML was injected into the “device name” field to embed phishing links into legitimate Robinhood emails
  • The fake emails passed SPF, DKIM, and DMARC checks, making them hard to detect
  • Robinhood confirmed no systems were breached and no funds or personal data were affected

Robinhood users received phishing emails that looked like they came directly from the company’s mail server. The emails warned of an unrecognized device login and included a button linking to a fake login page.

The attack was first reported on social media on Sunday, with multiple users sharing screenshots of the suspicious messages.

Robinhood Users Targeted by Gmail Dot Trick Phishing Attack

Cybersecurity researcher Alex Eckelberry confirmed the campaign was not the result of a hack. Instead, it exploited two weaknesses: Gmail’s dot alias behavior and flaws in Robinhood’s account creation process.

Gmail ignores dots in email usernames. So “jane.smith@gmail.com” and “janesmith@gmail.com” go to the same inbox. Robinhood, however, treats them as two separate accounts.

Scammers used this gap to create Robinhood accounts using a version of the target’s email address with the dot removed. This caused Robinhood’s system to send automated emails to the target’s real inbox.

How the Phishing Link Got Into the Email

To get a malicious link into those automated emails, attackers entered HTML code into Robinhood’s optional “device name” field during account setup. Gmail read that HTML as formatting instructions.

The result was a real email sent from “noreply@robinhood.com” that contained a fake warning and a working phishing button. It passed all standard email authentication checks.

Eckelberry said visiting the fake website alone would not compromise an account. The risk only kicks in if a user enters their password or other login details on the fake page.

Robinhood’s support account on X confirmed the incident on Monday. The subject line of the phishing email was “Your recent login to Robinhood.”

Robinhood’s Official Response

The company said the issue was an abuse of its account creation flow, not a breach of its systems. It stated that no personal information or funds were impacted.

Robinhood advised users to delete the email and avoid clicking any suspicious links. Users who did click were told to contact Robinhood directly through the official app or website.

The attack comes after blockchain security firm Hacken reported that phishing and social engineering attacks were the top threat in crypto during Q1 2026.

Hacken said those attacks caused around $306 million in losses in the first three months of the year alone.

Robinhood has not yet announced specific changes to its account creation process in response to the incident.

The post Robinhood Users Targeted by Gmail Dot Trick Phishing Attack appeared first on CoinCentral.

시장 기회
폴카닷 로고
폴카닷 가격(DOT)
$1.219
$1.219$1.219
-0.08%
USD
폴카닷 (DOT) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

Roll the Dice & Win Up to 1 BTC

Roll the Dice & Win Up to 1 BTCRoll the Dice & Win Up to 1 BTC

Invite friends & share 500,000 USDT!