PANews reported on April 16 that ENS developer nick.eth posted a warning that it had recently encountered a highly simulated phishing attack. The attacker exploited a vulnerability in Google's infrastructure, disguised it as an official email and bypassed DKIM verification. The email was sent from [email protected] and was deemed safe by Gmail. The embedded link in the email pointed to a phishing page under the "google.com" subdomain, guiding users to enter a simulated login interface to steal credentials. nick.eth called on users to be vigilant and not to trust the appearance of domain names.