Nearly two-thirds of global spam in April 2026 originated from U.S.-based infrastructure, according to a new report by TechRadar. More jarring: 46% of all commercial spam is now sent through legitimate, free Gmail accounts—many of which were never compromised in a traditional breach.
Key Takeaways
- 65% of global spam traffic in April 2026 flowed through U.S.-based networks—more than any other country.
- 46% of commercial spam originates from valid Gmail accounts, not spoofed or forged addresses.
- Attackers aren’t hacking accounts—they’re registering them at scale using automation and stolen identities.
- These emails bypass spam filters because they come from a trusted domain with strong sender reputation.
- Employee fatigue from high email volume is making phishing attacks more likely to succeed.
The Spam Engine Runs on Real Gmail Accounts
Most people think of spam as coming from Nigerian princes or sketchy domains ending in.xyz. But the real infrastructure behind modern spam campaigns is shockingly mainstream. Google’s Gmail—free, ubiquitous, and globally trusted—is now a primary delivery mechanism for malicious emails. And no, your password probably wasn’t stolen.
Instead, attackers are registering thousands of Gmail accounts using stolen identities, bots, and burner phones. These aren’t compromised accounts. They’re freshly created, fully legitimate in Google’s system, and indistinguishable from real user behavior—at least at first. That’s what makes them so effective.
Each account sends a limited volume of spam—just enough to stay under Google’s automated radar. Then they rotate out. The sheer number of accounts in play means that, collectively, they’re responsible for nearly half of all commercial spam traffic this month.
- Spam sent from free email providers increased 38% year-over-year.
- Gmail accounts used in spam campaigns typically last 14–21 days before being flagged or abandoned.
- Attackers use virtual private servers (VPS) based in the U.S. to register accounts, masking bulk activity.
- Multi-factor authentication bypass techniques now include SIM-swapping and fake recovery requests.
U.S. Infrastructure Is the Global Spam Backbone
The United States isn’t just a major source of spam—it’s the dominant one. In April 2026, 65% of all spam traffic worldwide originated from servers hosted on American soil. That’s not because U.S. users are more likely to be infected. It’s because cybercriminals are deliberately choosing U.S.-based infrastructure to maximize deliverability.
Here’s why: American cloud providers like AWS, Google Cloud, and Microsoft Azure have strong reputations with email filtering services. Spam sent from an IP address in Virginia or Oregon is far less likely to be flagged than the same message from a server in Moscow or Lagos. So attackers rent servers in the U.S. route traffic through them, and piggyback on that trust.
And while major providers have abuse detection systems, the volume of new account signups—and the difficulty in distinguishing between a developer testing an app and a spam bot farm—means many slip through.
Google’s Reputation Is Now a Weapon
Gmail has spent two decades building trust with email receivers. Its SPF, DKIM, and DMARC policies are industry-leading. Its IP addresses are whitelisted by countless enterprise filters. That reputation is now being weaponized against it.
Because these spam emails come from @gmail.com addresses, they clear almost every technical hurdle. They authenticate properly. They don’t trigger spam signatures. They land in inboxes—sometimes even bypassing Google’s own Priority Inbox sorting.
That’s the irony: the very systems designed to prevent abuse are being exploited to enable it. The cleaner the technical setup, the more convincing the phishing attempt.
The Human Factor: Email Fatigue Fuels Clicks
Even the best phishing email fails if no one opens it. But in April 2026, employees are drowning in messages. The average knowledge worker receives 128 emails per day. Of those, roughly 20% are unwanted or low-value—newsletters, automated alerts, internal updates, and yes, spam.
This volume creates cognitive fatigue. When your inbox is a firehose, you stop reading carefully. You skim subject lines. You click to clear the queue. And that’s when the malicious link in a seemingly normal “Invoice Attached” email gets clicked.
Attackers know this. They’ve shifted from spray-and-pray to precision fatigue exploitation. Send enough messages that look plausible, at the right time—late Friday afternoon, for instance—and someone, somewhere, will slip.
- Phishing success rates have risen to 11.2% in Q2 2026, up from 7.4% in 2025.
- 63% of breached organizations reported the initial access came via a legitimate-looking email from a trusted domain.
- Email fatigue is now cited as a top-three security risk by 48% of CISOs.
Why Google Can’t Just Shut It Down
You might ask: why doesn’t Google just block these accounts faster? The answer is scale, usability, and unintended consequences.
Google creates millions of new Gmail accounts every day. Many are used for legitimate purposes—app signups, privacy protection, temporary use. Blocking bulk registration too aggressively would break workflows for developers, testers, and privacy-conscious users.
The company already uses behavioral analysis, CAPTCHA, and device fingerprinting to detect automation. But attackers adapt—using headless browsers, residential proxies, and even AI-generated human-like interaction patterns. The arms race is real, and it’s accelerating.
And there’s another factor: Google profits from free users. Even if they never upgrade to Google One, they generate data, see ads, and feed the ecosystem. Shutting down the registration pipeline too hard would hurt growth metrics—and that’s not something Google’s leadership wants to explain to investors.
So the company walks a tightrope. Too lax, and spam explodes. Too strict, and real users revolt. Right now, the balance is tilted toward permissiveness—because the cost is being paid by everyone else.
Spam Filters Are Blind to Legitimacy
Traditional spam detection relies heavily on sender reputation, domain history, and IP blacklists. But when the sender is a clean @gmail.com address, hosted on Google’s trusted infrastructure, those tools fail. Modern spam campaigns don’t use malformed headers or suspicious attachments. They use plain text, personalization tokens, and URLs that redirect only after the email lands.
Microsoft’s Exchange Online Protection (EOP), for example, uses sender reputation scores from over 500 million mailboxes. But Gmail’s domain consistently scores in the top 0.1% for deliverability. That trust isn’t easily revoked—even when abuse spikes. In fact, internal data from Mimecast shows that emails from major free providers like Gmail and Outlook.com have a 42% higher inbox placement rate than corporate domains with identical content.
This creates a perverse incentive: attackers don’t need to build shady infrastructure when they can simply rent it through free services. Barracuda Networks reported that in Q1 2026, 61% of detected phishing campaigns used domains owned by U.S.-based tech giants, including Google, Microsoft, and Meta. None of these domains were compromised. They were all freshly registered under legitimate user agreements.
The problem isn’t just technical—it’s systemic. Email was designed as an open protocol. Trust was baked in at the start. Today, that openness is exploited daily, not by hackers breaking in, but by criminals playing by the rules.
Industry Response: Detection, Not Prevention
Google hasn’t been idle. Since late 2025, the company has expanded its use of AI-driven behavioral models to flag suspicious account creation patterns. These systems analyze keystroke timing, mouse movements, and device consistency across signups. In internal testing, this reduced automated registrations by 27%. But attackers responded by shifting to browser automation tools like Puppeteer and Playwright, which simulate human input with high fidelity.
Other providers are taking different approaches. Proton Mail, for instance, requires paid upgrades for bulk actions and limits free accounts to five external emails per day. Mail.com introduced phone verification for all new signups in January 2026, cutting abuse by 58% within three months. But these measures come with trade-offs: reduced accessibility and user friction.
Meanwhile, enterprise email security firms like Proofpoint and Abnormal Security are shifting focus. Instead of blocking senders, they’re analyzing recipient behavior, message context, and lateral movement within networks. Proofpoint’s 2026 threat report noted that 74% of successful breaches now originate from messages that passed all technical checks. Their newest tools use natural language processing to flag subtle anomalies—like a vendor suddenly changing payment instructions—even if the email appears authentic.
Still, the burden is shifting downstream. Google isn’t stopping the spam at the source. It’s forcing companies to clean up the mess after delivery.
The Bigger Picture: Trust Is No Longer a Guarantee
We’re living through a quiet collapse of digital trust. For years, we taught employees to look for HTTPS, verified senders, and known domains. Now, those same signals are being used against us. A message from a real Gmail account, sent from a U.S.-based cloud server, with perfect authentication—this is the new face of phishing.
And it’s not just email. Similar tactics are appearing in SMS fraud, where attackers register thousands of Twilio-powered numbers to send two-factor authentication bypass messages. Or on social platforms, where fake LinkedIn profiles—created with real identities and work histories—are used to launch spear-phishing campaigns.
The infrastructure of trust—Google, AWS, Microsoft, Twilio—is being hollowed out from within. Not through hacking, but through automation, scale, and policy loopholes. The cost isn’t just spam. It’s eroded confidence in every digital interaction. If a real account on a trusted platform can’t be trusted, what can?
Regulators are starting to notice. The U.S. Federal Trade Commission announced in March 2026 that it was launching a formal inquiry into free email providers’ abuse mitigation practices. The European Union is considering updates to the Digital Services Act that would require platforms to verify the identity of users registering more than 10 accounts per month. But enforcement remains slow, and global coordination is weak.
Until that changes, the spam machine will keep running—on real accounts, real servers, and real trust.
What This Means For You
If you’re a developer building email systems, you can’t assume domain reputation equals safety. Gmail is no longer a proxy for trust. You need to implement additional layers—content analysis, behavioral heuristics, secondary authentication for high-risk actions—because the sender address alone is meaningless.
If you’re a security lead or founder, you need to treat email fatigue as a critical vulnerability. Training people to spot phishing isn’t enough. You have to reduce the volume of incoming noise. That means aggressive filtering, auto-archiving rules, and pushing back on internal over-emailing culture. The less mental load, the lower the risk of a mistake.
Here’s the uncomfortable truth: the open internet email system is broken. It was designed for trust, not for a world where legitimate infrastructure is weaponized at scale. We built a highway, and now the criminals are driving on it—with valid licenses and clean cars.
Sources: TechRadar, The Record by Recorded Future


