Crypto Times Logo Black
Google News Follow Banner
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • DeFi News
    • Blockchain News
    • Industry
  • Exclusive
  • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Podcasts
  • More
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
The Crypto TimesThe Crypto Times
  • All News
  • Market
  • Bitcoin
  • Ethereum
  • Altcoins
  • Regulations & Policies
  • Blockchain
  • DeFi
  • Industry
  • Exclusive
  • Opinion
Search
  • News
    • Market
    • Bitcoin
    • Ethereum
    • Altcoins
    • Regulations & Policies
    • Blockchain
    • DeFi
    • Industry
    • Exclusive
    • Opinion
  • Learn
    • Explained
    • How To
    • Insights
  • Quick Links
    • About Us
    • Our Authors
    • Contact Us
    • Editorial Policy
    • AI Policy
    • Sponsored & Advertorial Policy
  • Podcasts
Follow US
© 2026 By Crypto Times. All Rights Reserved.
Industry

How Hackers Hijacked Robinhood’s Legitimate Emails Using Gmail Dot Aliases

Robinhood’s system then pulled the unsanitized HTML input directly into its automated “unrecognized activity” or “recent login” notification templates.

Written By:
Gopal Solanky

Last updated: 1 hour ago
Published 1 hour ago
Share
Last updated: 1 hour ago
Published 1 hour ago
How Hackers Hijacked Robinhood’s Legitimate Emails Using Gmail Dot Aliases
Show AI Summary
Attackers exploited a gap in Robinhood’s account creation process to inject malicious HTML code into notification templates.
Gmail’s email alias feature was manipulated to register new Robinhood accounts using dotted versions of victims’ email addresses.
The phishing campaign bypassed spam filters by utilizing Robinhood’s legitimate notification system to deliver malicious links to customers’ inboxes.

In the early hours of last weekend, dozens of Robinhood customers opened their inboxes to find what looked like a routine security alert from the popular trading app. 

The email came from noreply@robinhood.com. It carried all the right branding, passed every standard authentication check, and warned of unrecognized activity on their accounts. A prominent “Review Activity Now” button sat ready to click. 

For many, it felt official enough to act on. What they didn’t realize was that Robinhood’s own systems had delivered the phishing link straight to them. 

This wasn’t a traditional spoofed email or a clever domain trick. It was something more insidious: attackers turned Robinhood’s legitimate notification process against its users by exploiting a combination of Gmail’s long-known email alias quirks and a dangerous gap in how the platform handles user input during account creation. 

New Robinhood phishing chain that's kinda beautiful:

1. Attacker creates an RH account using the Gmail dot trick of your email (same inbox, different address)
2. Sets device name to HTML
3. RH's "unrecognized activity" email renders the device name unsanitized (html injection)… pic.twitter.com/IUOLNxQjC7

— Abdel (@rockkdev) April 27, 2026

The result has left security researchers calling it one of the more elegant attacks seen in recent months—a living-off-the-land campaign that required no breach of Robinhood’s core systems, yet still managed to bypass spam filters and user skepticism alike.

How was the attack carried out? 

Attackers exploited two well-known but rarely combined weaknesses. First, Gmail’s “dot alias” feature treats addresses like john.doe@gmail.com and johndoe@gmail.com as identical. 

Scammers registered new Robinhood accounts using dotted versions of victims’ real email addresses. Robinhood does not normalize these variants the same way Gmail does, allowing the emails to land in the target’s inbox. 

During signup, attackers inserted raw HTML code into the optional “device name” field. Robinhood’s system then pulled this unsanitized input directly into its automated “unrecognized activity” or “recent login” notification templates. The injected HTML rendered as a convincing “Review Activity Now” button linking to a fake login page designed to steal credentials and two-factor codes. 

Because the messages originated from Robinhood’s legitimate noreply@robinhood.com domain and passed SPF, DKIM, and DMARC checks, they bypassed most email filters and user suspicion. 

It’s not that Robinhood’s email servers were hacked, “but they have a couple of terrible holes in their account setup,” said a user. 

Discovery and Robinhood’s response

Cybersecurity researchers and users on X flagged the campaign over the weekend, with detailed breakdowns showing side-by-side comparisons of the forged emails. 

Robinhood confirmed the issue stemmed from abuse of its account creation flow, not a breach of its systems or customer data. Luckily, no funds or personal information were reported stolen in the initial wave. 

On Sunday evening, some customers received a falsified email from noreply@robinhood.com with the subject line “Your recent login to Robinhood.”

This phishing attempt was made possible by an abuse of the account creation flow. It was not a breach of our systems or customer…

— Robinhood Help (@AskRobinhood) April 27, 2026

The company advised affected users to delete the emails immediately and avoid clicking any links. Robinhood has not yet detailed specific fixes but is expected to implement input sanitization for email templates.

This attack stands out for its elegance. Traditional phishing relies on spoofed domains or obvious red flags. Here, the email is genuinely from Robinhood—just tainted at the source. It highlights ongoing challenges in handling user-controlled data in automated communications, especially for financial platforms where trust is paramount. 

Security experts note that similar flaws exist elsewhere. Many such platforms often fail to escape HTML in notification fields, and Gmail’s alias behavior has been a known vector for years. The timing, just ahead of Robinhood’s Q1 2026 earnings, added extra scrutiny. 

Among many leaders, Ripple CTO David ‘JoelKatz’ Schwartz also flagged the issue on X, noting, “Any emails you get that appear to be from Robinhood (and may actually be from their email system) are phishing attempts.” 

WARNING: Any emails you get that appear to be from Robinhood (and may actually be from their email system) are phishing attempts.

Example: pic.twitter.com/oJilpQqJdp

— David 'JoelKatz' Schwartz (@JoelKatz) April 27, 2026

While Robinhood users dodged widespread compromise this time, the incident serves as a reminder that even authenticated emails can carry risks. Financial apps remain prime targets, and attackers continue refining methods that exploit trust rather than break it outright. 

Also read: Fake Arthur Hayes Email Targets Fans with Crypto Trading Scam

Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.

Follow The Crypto Times on Google News to Stay Updated!      Google News
Google News Banner

TAGGED:Crypto Hack
Share This Article
Whatsapp Whatsapp LinkedIn Telegram Copy Link
Gopal Solanky - Crypto Research Analyst at The Crypto Times
By Gopal Solanky Sr. Crypto Journalist
Follow:
Gopal Solanky is a Research Analyst and Reporter with over 5 years of experience in DeFi, blockchain, crypto, IT, and financial markets. With a Bachelor's in Computer Applications, he brings a strong technical foundation to his analysis and reporting. Gopal focuses on breaking down complex topics for both seasoned investors and curious readers. His work has been referenced by publications like Business Insider and Vulture.com, highlighting his contributions to industry stories around topics like Huwak Tuah Memecoin and the FTX collapse.

Latest News

WTIOIL Climbs to Second Spot on Hyperliquid Amid Global Oil Volatility
WTIOIL Climbs to Second Spot on Hyperliquid Amid Global Oil Volatility
Ondo and Broadridge Launch Onchain Voting for Tokenized Stocks
Ondo and Broadridge Launch Onchain Voting for Tokenized Stocks
Jack Dorsey’s Block Discloses $2.2B Bitcoin Holdings, Sparks Transparency Debate
Jack Dorsey’s Block Discloses $2.2B Bitcoin Holdings, Sparks Transparency Debate
BlackRock's $2.5B BUIDL Lands on OKX as Yield-Bearing Collateral, with Standard Chartered as Custodian
BlackRock’s $2.5B BUIDL Lands on OKX as Yield-Bearing Collateral, with Standard Chartered as Custodian
Bitcoin Tumbles on Leveraged Long Flush as Spot Markets Hold Steady
Bitcoin Tumbles on Leveraged Long Flush as Spot Markets Hold Steady

Find Us on Socials

You may also like

Fake Arthur Hayes Email Targets Fans with Crypto Trading Scam

Fake Arthur Hayes Email Targets Fans with Crypto Trading Scam

‘Scam Altman’ Musk’s Jab Meets ZachXBT Claim as Worldcoin Faces Fresh Scrutiny

‘Scam Altman’: Musk’s Jab Meets ZachXBT Claim as Worldcoin Faces Fresh Scrutiny

ZetaChain Halts Cross-Chain Activity After GatewayEVM Smart Contract Exploit

ZetaChain Halts Cross-Chain Activity After GatewayEVM Smart Contract Exploit

Gemini Introduces Agentic Trading for Automated Crypto Execution

Gemini Introduces Agentic Trading for Automated Crypto Execution

The Crypto Times Logo PNG

Providing real-time, accurate Crypto reporting. Your trusted source for Crypto News and Research.

Stay Updated

All News
Exclusive
Opinions
Learn
Podcasts

Company

About Us
Our Authors
Editorial Policy
AI Policy
Advertorial Policy

Get In Touch

Contact Us
Career

Find Us on Socials

X-twitter Linkedin Telegram Youtube Instagram

© 2026 The Crypto Times | A BITROCK TECHNOLOGIES L.L.C. Company.

DMCA.com Protection Status
  • Terms and Conditions
  • Disclaimer
  • Privacy Policy
  • Cookie policy
Do Not Sell or Share My Personal Information