Phishing Gangs Expand Targets to Microsoft, Google, and Twilio

Barracuda phishing OAuth Microsoft

Phishing has always been a moving target, but the latest data shows just how fast attackers are evolving. Email-based scams that once relied on crude tricks are now weaponizing trusted services, slipping past filters, and fooling even experienced users. Barracuda’s ongoing threat intelligence work tracks these shifts in real time, giving security teams a clearer picture of how the threat landscape is changing and where defenses need to adapt next.

September Threat Radar Findings

Barracuda’s latest threat intelligence highlights attackers zeroing in on Microsoft OAuth credentials, a high-value target because a single compromised login can open the door to a user’s email, files, and cloud apps. Google’s own platforms also became weapons in these campaigns: services like Translate and Classroom were abused to disguise links, while fraudulent reseller offers dangled deep discounts as lures. Twilio’s SendGrid customers were hit from another angle, with phishing gangs using technical-sounding subject lines to sneak past defenses and trick recipients into clicking.

Together, these tactics show a clear pattern: criminals are leaning on familiar, trusted brands to make their attacks look legitimate.

What’s at Risk

Microsoft, Google, and Twilio are fixtures of daily work, so emails tied to those services don’t immediately raise red flags. That gives attackers a wide funnel of potential victims, from corporate IT staff to everyday users logging into online classrooms. Because these campaigns can be launched anywhere and spread quickly, the risk is global. For enterprises, a single compromised account can cascade into data theft or business disruption. For individuals, it can mean stolen identities, drained accounts, or hijacked email used to scam friends and colleagues.

Adam Khan, Barracuda’s VP of Global Security Operations, warns that these gangs are moving fast and hitting where users feel safest. “Prominent phishing gangs are rapidly advancing their tactics, weaponizing trusted platforms like Microsoft OAuth along with popular development and productivity tools to gain unauthorized access and spread malicious content,” he said. “This underscores the urgent need for integrated defenses that combine 24/7 monitoring with strong user education to stay ahead of evolving threats. As adversaries grow more sophisticated, cyber resilience, defined as the ability to detect, respond, and recover from a breach, will be just as critical as prevention.”

Next Steps for Organizations

Defending against these campaigns requires a layered approach. Advanced email security tools that use AI to flag suspicious patterns can catch attacks that traditional filters miss. But technology alone won’t close the gap. Employees need regular training and phishing simulations so they know how to spot and report suspicious messages.

Adopting zero-trust principles adds another layer of protection by assuming no user or device is automatically safe. Pair that with continuous monitoring, and organizations are better positioned to catch intrusions early and limit the fallout when attackers find a way in.

Staying a Step Ahead

Phishing isn’t a fixed threat. It morphs with every new tool, platform, and user habit it can exploit. What worked yesterday to block scams may not hold up tomorrow.

That’s why resilience matters more than any single safeguard. Organizations and individuals alike need defenses that adapt—layered technology, smart policies, and educated users who know the signs of a con. The goal isn’t to stop every attack before it starts, but to build systems and habits strong enough to withstand the ones that inevitably get through.

Author
  • Contributing Writer, Security Buzz
    Michael Ansaldo is a veteran technology and business journalist with experience covering cybersecurity and a range of IT topics. His work has appeared in numerous publications including Wired, Enterprise.nxt, PCWorld, Computerworld, TechHive, GreenBiz, Mac|Life, and Executive Travel.