5 Types of Phishing Emails That Fool Gmail in 2026
Gmail catches 99.9% of phishing. These are the types that get through, and why they're getting harder to spot.
Gmail’s spam filter is world-class. It catches 99.9% of phishing attempts using some of the most sophisticated AI on the planet. But as we covered in why your Gmail spam filter isn’t enough anymore, the emails that get through are the ones that matter most, because they’re the ones designed to look exactly like real messages.
Here are five types of phishing emails that are consistently bypassing Gmail’s filters in 2026, and what makes each one effective.
1. The AI-Personalized “Colleague” Email
What it looks like: An email from a coworker asking you to review a document, approve an expense, or update a shared resource. The sender’s name matches someone in your organization. The writing style is natural. The request is routine.
Why it works: AI tools scrape LinkedIn, company websites, and social media to identify real employees and their roles. The email is personalized with real project names, real department references, and real formatting conventions. There’s nothing technically suspicious for a filter to flag.
Why it bypasses Gmail: No malware, no suspicious links (often uses legitimate Google Docs or OneDrive links), no bulk sending pattern. It’s a single, targeted email that looks exactly like internal communication.
2. The Vendor Invoice Attack
What it looks like: An invoice or payment request from a vendor your company actually uses. Correct logo, correct formatting, correct invoice structure. The only difference: the bank account has been changed.
Why it works: Attackers research your vendor relationships through public procurement records, job postings (“we use Salesforce/HubSpot/AWS”), or compromised vendor accounts. The invoice looks identical to real ones because it’s built from a template of real invoices.
Why it bypasses Gmail: The email comes from a domain that looks legitimate (or is a compromised legitimate domain). The attachment is a standard PDF. The content matches normal business correspondence.
3. The Delayed Follow-Up
What it looks like: A reply to a conversation thread you actually participated in. “Just following up on our discussion from last week.” The thread history is real, pulled from a previously compromised account.
Why it works: You see a familiar thread, recognize the context, and treat the new message as legitimate. The attacker has injected themselves into a real conversation.
Why it bypasses Gmail: Thread-based replies inherit trust signals from the original conversation. Gmail’s filter sees it as a continuation of a legitimate thread, not a new message from an unknown sender.
4. The Service Notification
What it looks like: A notification from a service you actually use. “Your subscription payment failed.” “Action required on your account.” “New sign-in from an unrecognized device.” Google, Microsoft, Amazon, your bank: all are impersonated.
Why it works: The urgency is real. If your payment actually failed or someone actually logged into your account, you’d want to act quickly. The attacker counts on that urgency overriding caution.
Why it bypasses Gmail: Modern phishing pages clone legitimate login screens pixel-for-pixel. The email uses standard notification formatting. Some even use legitimate mail infrastructure (compromised marketing platforms).
5. The Executive Request
What it looks like: A brief, urgent message from a senior leader. “I need you to handle something for me quickly. I’m in a meeting and can’t call.” Often a text-style message: short, no signature block, sent from a mobile device.
Why it works: Authority + urgency. You don’t question your CEO’s email style when they say it’s urgent. The brevity is the disguise; there’s so little content that there’s nothing for a filter to flag.
Why it bypasses Gmail: Single message, no attachments, no links, from a plausible-looking address. The email is technically clean. It’s just not from who it claims to be.
The Pattern
All five types share the same characteristic: they look like emails from people you know or services you trust. Content analysis can’t distinguish them from real messages because the content is designed to be indistinguishable. This is exactly why we believe deterministic filtering beats probabilistic guessing.
What Helps
Training helps you recognize the patterns, but it doesn’t help when the email is genuinely indistinguishable from a real one.
Two-factor authentication helps protect your accounts if you do click a phishing link.
Identity-based filtering addresses the root problem. If your inbox separates known senders from everyone else, impersonation fails at the gate. The attacker may have your CEO’s name and writing style, but they’re sending from a different address. That’s all that matters.
Rythm works on this principle. Your contacts pass through freely. Unknown senders, including impersonators, are held in a separate folder until they verify themselves. It doesn’t matter how convincing the email is. If the sender isn’t on your guest list, the message waits. This is especially critical for preventing business email compromise, the most expensive form of cybercrime in the country.