Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Google AI Blocks 10B Scam Messages

November 4, 2025
Reading Time: 3 mins read
in News
Google Search AI Mode Knows Everything

Google is actively fortifying its Android platform against widespread scams, detailing the massive scale of its defense efforts. Every month, the company’s built-in protections on Android devices successfully safeguard users globally from over 10 billion suspected malicious calls and messages. On top of that, Google has preemptively blocked more than 100 million suspicious numbers from utilizing Rich Communication Services (RCS), the modern standard for SMS, preventing these scams from even being sent. These actions are part of a continuous effort that has seen the company implement various safeguards in recent years, including using on-device artificial intelligence to automatically filter known spam and shunt it into a designated “spam & blocked” folder within the Google Messages app.

The company recently enhanced its user protection by globally rolling out safer links in Google Messages. This feature warns users before they click on any URLs in a message that has been flagged as spam, effectively preventing visits to potentially harmful websites unless the user explicitly marks the message as “not spam.” In terms of the types of attacks being mitigated, Google’s August 2025 analysis of user-submitted reports identified employment fraud as the most prevalent scam category. In these schemes, individuals seeking work are drawn in by fake job opportunities, the true goal of which is to steal their personal and financial information.

Beyond job-related cons, other prominent scam categories include financially-motivated schemes that focus on bogus unpaid bills, subscriptions, and fees, as well as fraudulent investment schemes. The company also noted the presence of scams related to package deliveries, impersonation of government agencies, romance, and technical support. A particularly interesting evolution in tactics is the increasing use of group chats for scam messages, as opposed to direct one-on-one communication.

Google suggested this tactical shift may be intentional, noting that group messages can appear less suspicious to recipients. This effect is often magnified when a scammer includes an accomplice in the group chat to validate the initial message and create the illusion of a legitimate conversation. Furthermore, the company’s analysis found that malicious messages adhere to a “distinct daily and weekly schedule.” Activity typically starts around 5 a.m. PT in the U.S. and then peaks between 8 a.m. and 10 a.m. PT. Mondays generally see the highest volume of fraudulent messages, aligning with the beginning of the workday when recipients are likely to be busier and potentially less vigilant about incoming communications.

Many of these scams share common initial techniques, often starting with a “Spray and Pray” approach. This involves casting a very wide net with the hope of ensnaring a small number of victims by creating a false sense of urgency—for example, through lures tied to topical events, package delivery notifications, or toll charges. The primary goal is to rush targets into clicking on malicious links without much thought. These links are frequently shortened using URL shorteners to mask dangerous destination websites, ultimately seeking to steal the victim’s personal information. Alternatively, scammers employ a more calculated method called “Bait and Wait,” a personalized targeting approach where the threat actor deliberately establishes rapport with a target over an extended period before making their final move. Scams like romance baiting, also known as “pig butchering,” are typical examples of this slower, high-effort category.

Reference:

  • Google Built In AI Defenses On Android Now Block 10 Billion Scam Messages Monthly
Tags: Cyber NewsCyber News 2025Cyber threatsNovember 2025
ADVERTISEMENT

Related Posts

Google Search AI Mode Knows Everything

Proton Launches Data Breach Observatory

November 4, 2025
Google Search AI Mode Knows Everything

Google Search AI Mode Knows Everything

November 4, 2025
Microsoft Edge Adds Scareware Sensor

Apple Pay VP Unveils Wallet Updates

November 3, 2025
Microsoft Edge Adds Scareware Sensor

Meduza Stealer Malware Admins Arrested

November 3, 2025
Microsoft Edge Adds Scareware Sensor

Microsoft Edge Adds Scareware Sensor

November 3, 2025
Ukrainian Extradited Over Ransomware

Ukrainian Extradited Over Ransomware

October 31, 2025

Latest Alerts

CISA Warns Linux Flaw Exploited

China Linked Tick Exploits Lanscope

Nation State Hackers Deploy Airstalk

HTTPTroy Backdoor Poses As VPN Invoice

China Linked Hackers Exploit Shortcut In

BankBot YNRK And DeliveryRAT Exposed

Subscribe to our newsletter

    Latest Incidents

    Cybercriminals Exploit Remote Monitoring

    Malibu Boats Australia Hit By Ransomware

    Balancer Suffers 128 Million Exploit

    Penn Hacker Claims Major Data Breach

    FBI Says Rogue Workers Behind Hacks

    Hackers Extort 350K From Massage Clients

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial