Pentera Labs Uncovers Gmail Weakness That Lets Attackers Pass Malware Off as “Scanned”
Pentera Labs Exposes Flaws That Let Attackers Stamp Malware as Safe in Gmail
Boston, MA – May 11, 2026 – Pentera, the Exposure Validation Company, has uncovered structural flaws in the integration between Gmail and Google Drive that allow malicious files to bypass Google’s native security controls and reach user inboxes bearing a “Scanned by Gmail” seal of approval.
In the first finding, the research demonstrates that files explicitly blocked by Gmail’s attachment scanner can be uploaded to Google Drive, and then shared through the platform’s native Drive-to-Gmail integration. These files are then delivered to recipients as standard-looking attachments complete with Gmail’s trusted safety label, despite the file having already been identified as malicious.
In a second finding, applicable specifically to executable files, Pentera Labs researchers showed that Google Drive warns users before downloading and Gmail blocks them as attachments outright. But when those same files are routed through Drive and into Gmail, the download warning no longer appears, and Gmail’s attachment restrictions can be side stepped using Drive links. Recipients can download the file with no warning at all.
“The exact same file Gmail flags as malicious and refuses to send, can still reach the inbox through Google Drive, presented as if it’s been verified,” said Ben Ilkashi, Security Researcher at Pentera Labs. “From a user’s perspective, there is no visible difference. It looks like a normal, trusted attachment.”
Pentera Labs researchers hypothesize that these issues may stem from Gmail extending implicit trust to files originating from Drive, under the assumption that content within Google’s ecosystem is pre-vetted. That dynamic creates a gap attackers can deliberately exploit, turning Google’s own infrastructure into a high-trust malware delivery mechanism for phishing campaigns. The risk extends beyond corporate environments, potentially impacting every individual with a Gmail account.
Google confirmed the validity of the report. As of publication, no fix or official timeline has been released.
For security teams:
- Treat emails containing Google Drive links with the same scrutiny as direct file attachments, regardless of safety labels.
- Configure secure web gateways to sandbox files downloaded from Drive links.
- Enforce Gmail content compliance rules to flag or quarantine emails from external senders that include Drive sharing links.
For individuals and everyday Gmail users:
- Treat emails with Google Drive links the same way you would treat unexpected attachments, even if Gmail marks them as “safe” or “scanned.”
- Understand that Gmail’s safety labels do not guarantee a file or link is harmless.
The full research report is available at https://pentera.io/resources/research/integration-flaws-Gmail-Google-drive