Maryland-based mostly security company INKY Stability tracked assault action associated to the vulnerability from mid-May via mid-July. The phishing assault relies on a acknowledged open redirect vulnerability (CWE-601) and popular brand recognition to deceive and harvest qualifications from unsuspecting Google Workspace and Microsoft 365 buyers.