

A new phishing scam is targeting personal Gmail accounts, with fraudsters impersonating corporate directors to gain trust and access to sensitive information. The scam has sparked concern among professionals, particularly in industries where data breaches and online fraud are on the rise. The emails, originating from seemingly legitimate addresses, have raised questions about how personal Gmail accounts are being accessed and exploited.
The scam unfolded when multiple employees at various companies reported receiving emails from addresses using the domain “@blueyonder.co.uk.” These emails appeared to come from their directors but were sent to personal Gmail accounts, not the official work email addresses. This incident left employees puzzled, as their personal Gmail addresses had never been shared within the company’s internal systems or directories.
The emails included requests for confidential or urgent information, a common tactic used in business email compromise (BEC) attacks. Employees, particularly those with less awareness of phishing schemes, could easily fall victim to such emails if they fail to recognize the signs of impersonation or verify the legitimacy of the sender.
A forum post detailing the scam provided a key example of how such phishing attempts are designed to manipulate recipients. The post described an email received early in the morning, claiming to be from the company’s director, and asking for critical business information. The recipient, who had no recollection of sharing their personal Gmail account with the company or its leadership, was stumped by how the fraudsters obtained the address.
The forum contributor offered a plausible theory: personal Gmail accounts may have been harvested through data breaches on professional networking platforms like LinkedIn. Over the years, LinkedIn has experienced multiple breaches, and the exposure of email addresses linked to professional profiles could provide scammers with an opportunity to connect Gmail accounts to specific organizations.
Once these accounts are harvested, fraudsters can conduct mass phishing campaigns, emailing employees using their personal accounts but posing as senior executives or directors. This method bypasses corporate email security measures and directly targets employees through channels where they might not expect to encounter phishing attempts. In many cases, these emails exploit a sense of urgency, creating a high-pressure situation where employees might act without proper verification.
Cybersecurity experts have raised alarms about the increasing sophistication of phishing schemes that leverage personal information from data breaches. These schemes highlight the growing need for individuals and companies to remain vigilant and take proactive steps in protecting personal data. Although corporate systems may have robust security measures, personal email accounts often do not receive the same level of protection, making them a prime target for phishing campaigns.
To counter this threat, some industry experts recommend using tools like Lusha or other similar platforms to cross-check email formats and verify the authenticity of senders. Lusha, for instance, offers tools for validating corporate email addresses, making it more difficult for scammers to impersonate company executives using unofficial email accounts.
Phishing attacks have been evolving for years, but this specific trend of targeting personal Gmail accounts for business-related scams marks a concerning development. Fraudsters are no longer focusing solely on corporate networks; instead, they are exploiting personal email accounts to circumvent advanced corporate security systems and gain unauthorized access to sensitive data.
The harvesting of emails from LinkedIn is a major concern. LinkedIn, one of the world’s largest professional networking platforms, has over 700 million users. It has previously been subject to multiple breaches, including a 2012 incident where over 6.5 million hashed passwords were stolen. While LinkedIn has since enhanced its security protocols, the possibility of harvested data being used for phishing schemes remains a valid threat, especially considering the overlap between personal and professional email addresses that many users maintain.
These scams often follow a similar pattern: the emails contain vague or urgent requests, sometimes claiming to need information related to an ongoing deal or financial transaction. They are crafted to appear casual but authoritative, making it difficult for recipients to discern any red flags at first glance. Impersonation of senior leadership further adds a layer of legitimacy to the message, which is why such phishing attempts can be highly effective.
For employees, the first line of defense is skepticism. When receiving unexpected emails, particularly those involving unusual requests or coming from personal addresses, it is crucial to verify the sender through an independent channel. This could mean reaching out to the purported sender via phone or another email account to confirm whether the message was indeed from them.
For companies, it is critical to educate staff on the risks of phishing attacks, not only within the corporate environment but also on their personal accounts. Cybersecurity awareness training should include guidance on identifying phishing attempts, securing personal information, and verifying the legitimacy of communication from superiors. Given the growing interconnectedness between personal and professional digital identities, such training is no longer optional—it is essential.
Additionally, organizations should encourage employees to use separate email addresses for personal and work-related accounts. While this does not guarantee full protection, it adds a layer of complexity for potential scammers trying to link personal Gmail accounts with corporate identities.