Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Huntress Managed ITDR for Google Workspace: Defending the New Identity Attack Surface
Published:
March 24, 2026

Huntress Managed ITDR for Google Workspace: Defending the New Identity Attack Surface

By:
Erin Meyers
Share icon
Glitch effectGlitch effectGlitch effect

For a long time, most organizations treated Google Workspace (GWS) like a productivity tool.

Email. Documents. Calendars. Chat. Useful, sure. But not exactly the thing keeping security teams awake at night.

Attackers see it differently.

To them, GWS isn’t just collaboration software. It’s identity infrastructure. The connective tissue of modern business. And once you start looking at it that way, the risk picture changes pretty quickly.

Think about it.

Gmail identity sprawl: An interconnected SaaS world

A compromised Workspace account doesn’t just expose email. It opens doors to password resets across SaaS platforms, MFA verification messages, OAuth permissions, vendor conversations, financial workflows, and internal trust relationships. Gmail, in many environments, quietly functions as the root identity layer for the cloud.

Which means that when attackers gain access to a Workspace account, they rarely stop at the inbox. They pivot. They expand. They start treating that identity like a launchpad.

That’s exactly why we’re introducing Huntress Managed Identity Threat Detection and Response (ITDR) for Google Workspace—bringing the same SOC-led identity protection we deliver for Microsoft 365 to the Workspace ecosystem.

And we’re not starting from scratch here.

Huntress Managed ITDR already protects over 10 million identities across environments, with a 3-minute mean time to respond, and a false positive rate under 5%. It’s battle-tested, not theoretical.

This expansion simply brings that same proven approach to Google Workspace.

Because attackers aren’t breaking in anymore. They’re logging in.


Google Workspace has become a very attractive target

GWS adoption has exploded over the past decade. Small businesses run their entire company on it. Mid-market organizations rely on it for identity and collaboration. MSPs manage thousands of tenants.

From an attacker’s perspective? That’s a lot of opportunity.

Over the past two years alone, researchers and incident responders have observed a steady evolution in how threat actors abuse the Workspace ecosystem. The techniques keep changing, but the pattern is consistent: identity first.

Some of the trends we’re seeing include:

  • Business email compromise (BEC) campaigns tied to Gmail account takeovers

  • Phishing delivered through trusted Google services like Drive or Slides

  • OAuth and consent phishing replacing traditional credential theft

  • Identity token theft through SaaS integrations

  • Workspace subdomain abuse triggering legitimate password resets

Here's the tricky part. Most of these attacks don’t involve malware at all. No suspicious attachments. No obvious payloads. No endpoint alerts lighting up dashboards. Just normal activity. 

And that’s exactly why it works.

This isn’t a tooling gap as much as it’s a visibility gap. Most security tools weren’t built to detect identity abuse that happens after authentication.

But attackers are living there now. And the data backs it up.

In 2025, 79% of all Huntress critical/high incident reports were identity-related. Not endpoint. Not malware. Identity.

That’s where the fight moved.

Business email compromise isn’t just email anymore

When people hear BEC, they usually picture a phishing email asking for a wire transfer.

That still happens. But the modern playbook is a little more sophisticated. Today’s BEC campaigns often unfold as multi-stage identity attacks. They move slowly. Quietly. Sometimes, surprisingly methodically.

First comes INITIAL ACCESS. Maybe stolen credentials from a phishing kit. Maybe session hijacking. Maybe OAuth abuse. However it happens, the attacker gains access to a Workspace account.

Next comes DISCOVERY. They start reading email conversations, mapping relationships, looking for financial workflows, vendor discussions, approval chains. It’s reconnaissance, but through a mailbox.

Then comes STEALTH. Attackers often create Gmail filter rules designed to delete security notifications or archive responses to malicious emails. The victim never sees warning messages. Replies disappear into the void. Everything looks normal. Which is exactly the point.

After that comes ACTION. Phishing messages. Fraud requests. Internal social engineering. Whatever makes money.

And finally, PERSISTENCE. Forwarding rules. OAuth tokens. Backup access paths. Attackers assume passwords might get reset eventually, so they prepare alternatives.

The important detail here is easy to miss—email compromise isn’t the goal. It’s the starting point.

Once attackers control a Workspace identity, they can pivot into SaaS platforms through password resets, MFA messages, and OAuth workflows. In practice, Gmail becomes a kind of identity clearinghouse—one compromised account unlocking access to many others.

That’s why defending Workspace environments requires something more than spam filtering. It requires identity detection and response.


Introducing Managed ITDR for Google Workspace

Huntress Managed ITDR for GWS focuses on detecting the behaviors attackers can’t easily disguise. Not raw logs. Not endless alerts. Behavior.

And when something suspicious happens, the Huntress SOC investigates and takes action. No waiting around for overwhelmed security teams to triage alerts at 2am.

At launch, the platform focuses on a handful of high-impact attack patterns.

Because stopping a few critical behaviors often shuts down entire attack chains.


Unexpected login activity

Attackers rarely log in from the same place as legitimate users. They prefer VPNs, proxies, or rented cloud infrastructure to obscure their location.

Managed ITDR watches for authentication patterns that don’t fit—risky networks, unusual geographies, or infrastructure commonly abused by threat actors.

When those signals appear, our analysts can quickly revoke sessions and remove attacker access.

Short dwell time. Fewer surprises.

Malicious inbox rules

This one shows up constantly in real-world incidents.

Attackers create Gmail filter rules designed to automatically delete or archive security notifications. MFA alerts disappear. Suspicious login warnings vanish. Victim replies to phishing messages get hidden.

From the outside, the account looks perfectly normal. But inside the inbox? Quiet manipulation.

Managed ITDR detects those rule changes, and Huntress analysts remove them, shutting down one of the most common persistence techniques attackers rely on.

Malicious datacenter infrastructure

Threat actors increasingly route authentication through cloud hosting providers instead of residential networks.

So Managed ITDR tracks login activity tied to datacenter providers and ASNs commonly used in attacks, surfacing suspicious access earlier in the attack chain.

Think of it as a behavioral signal attackers struggle to disguise.

A real Google Workspace identity attack

Let’s make this concrete. Below is a real example of how an identity attack unfolded inside a Workspace environment.


Here’s what happened:

A threat actor compromised a GWS account using stolen credentials. To hide their location, they routed authentication through suspicious datacenter infrastructure and proxy services.

Once inside the account, they got to work.

The attacker created Gmail inbox rules designed to delete Google security alerts - essentially blinding the victim to suspicious login activity. Classic BEC setup.

The next step likely would've been phishing messages or financial fraud requests sent from the trusted account.

But the attack never got that far.

Managed ITDR detected two signals almost immediately: authentication from suspicious infrastructure and newly created inbox rules suppressing security alerts.

The identity compromise was escalated to the Huntress SOC.

Our analysts revoked the attacker’s access, removed the malicious rules, and began investigating related indicators across the environment.

That investigation uncovered additional activity: password change attempts, probes against administrative accounts, and attempts to distribute malicious calendar invites.

Those indicators were then used to pivot across Huntress telemetry, identifying other identities targeted by the same threat actor.

The attack stopped before it escalated. Minimal disruption. Minimal investigation time.And no fraudulent invoices flying around.

This isn’t a new bet for Huntress

This launch isn’t a “maybe this works” moment. It’s an extension of something already working at scale.

Today, Huntress Managed ITDR protects over 93,000 organizations across Microsoft 365 and Google Workspace environments.

We sent over 116,000 positive ITDR incident reports in 2025 alone. And we’re already at more than 34,000 in 2026.

That’s not noise. That’s real attacker activity, investigated and acted on.

Behind the scenes, we’ve continued investing heavily in identity protection, rolling out features like Incident Report Timelines and mass outbound phishing detection to improve both visibility and response.

And it shows.

Turns out, when you solve real problems, people notice.


One identity defense layer for Microsoft and Google

Many organizations operate in hybrid environments today. Microsoft 365 on one side. Google Workspace on the other.

Until recently, protecting those ecosystems meant juggling multiple tools and fragmented workflows.

With the expansion of Managed ITDR to Google Workspace, Huntress now provides:

  • One platform

  • One SOC

  • Identity protection across both ecosystems

Simple idea. Big operational relief.

Identity is the new endpoint

Security changes slowly. Attackers change fast.

Right now, the reality is simple: attackers don’t need malware to cause serious damage. They just need access to the right identity.

And GWS sits right in the middle of modern business operations—powering communication, authentication, and trust relationships across the cloud, making it a very attractive target.

So we expanded Managed ITDR to protect it. Because if attackers are treating identity like the front door to the business…

...someone should be watching that door.

All the time.

And that's the job Huntress shows up for every day.

👉 Interested in protecting your GWS identities? Sign up for a free 14-day trial of Managed ITDR. 





Categories
Huntress News
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Don't let "later" cost you

Join us on May 20 (12pm EST) for _declassified, for an unfiltered look from Truman Kain at the overlooked security obligations that hit hard later.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • How a College Student Lost $10,000 to “The IRS”

    In this testimonial, learn firsthand from one of our Security Awareness Consultants at Curricula about how a fake IRS phishing scam worked on one student.
  • Rapid Response: Mass MSP Ransomware Incident

    Huntress is tracking a critical ransomware incident affecting MSPs and their customers, caused by a sophisticated Kaseya VSA supply chain attack.
  • What Is Single Sign-On?

    Learn what single sign-on (SSO) login is, how it’s used in role management and cybersecurity, and how to set it up at your organization.
  • Ask the Mac Guy: macOS Security Myths

    Discover the truth about macOS security. The Huntress Mac Guy answers common macOS security questions like why you should protect your Mac computers.
  • 2021 in Review (And Other Horror Stories)

    We recap some of the cybersecurity trends and events in 2021 to prepare for the new year.
  • Spidering Through Identity for Profit and Disruption

    Dive into the recent Las Vegas casino cyberattacks linked to Scattered Spider, and learn how organizations can defend against such identify-based attacks.
  • How a Pharmacy Cyberattack is a Warning Sign for Healthcare’s Cybersecurity Vulnerabilities

    Learn how a single cyberattack on a pharmacy tech provider disabled access for millions of patients and what it means for the healthcare industry moving forward.
  • From Custom Scripts to Commodity RATs: A Threat Actor’s Evolution to PureRAT

    Trace a threat actor's journey from custom Python stealers to a sophisticated commodity RAT. Learn how their tactics evolved and why this shift to .NET matters.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy