A coordinated wave of fraud targeting digital advertising agencies surfaced publicly today, April 10, 2026, after Pauline Jakober, Founder of Group Twenty Seven and a recognized paid media expert, shared a detailed account on LinkedIn of how a sophisticated scammer nearly infiltrated her agency using a fabricated client inquiry. The incident has drawn attention from some of the most prominent names in paid search, including Ginny Marvin, Google's Ads Product Liaison.
The case is a sharp illustration of how criminals are adapting their methods to the operational realities of Google Ads agency management - specifically, the trust relationships that exist between agencies and the Manager accounts (MCC accounts) they use to oversee client campaigns.
The mechanics of the attack
The scam began as a routine business inquiry. A lead arrived through Jakober's agency website, purportedly representing a large global conglomerate. The submission looked credible. The communication was polished. Nothing immediately indicated a problem.
Jakober's first instinct, however, was to verify. She checked the domain from which the email originated. The address followed the pattern [email protected], using a domain that, when typed into a browser, redirected cleanly to the legitimate company website. That redirect was the first deceptive layer. The fraudsters had registered a look-alike domain designed to pass casual inspection.
The second check involved LinkedIn. The supposed sender could not be found on the platform at all - what Jakober described as "a yellow flag." Agencies routinely receive inbound leads from marketing contacts at large corporations; the absence of any LinkedIn presence was anomalous.
She responded anyway, to gather more information. The reply came back immediately. Speed alone is not a red flag in business correspondence, but the content of the response was. According to Jakober, "insider info" the sender provided did not match what was publicly available on the company's real website or what she could verify through Google Ad Transparency.
The definitive check came through Whois records. The domain [email protected] had been registered just three days before the inquiry arrived - on April 7, 2026. Domains created within days of first contact are a consistent marker in this class of fraud.
Jakober then went a step further. She contacted the actual Marketing Director of the company being impersonated, reaching out directly on LinkedIn. His confirmation was unambiguous. According to Jakober, he stated it was "100% spam."
Why agencies specifically
The thread generated more than 22 comments and 5 reposts within hours, with practitioners across the paid media industry sharing near-identical experiences. Harrison Jack Hepp noted he had received what appeared to be the same form submission and had checked the Whois data independently, leading to the same conclusion. Dianna Huff described receiving that same email and responding, only to receive no reply. Jack Barsch said his agency had also received similar outreach.
The pattern suggests a coordinated operation running across multiple targets, not an isolated attempt.
The question several commenters raised is precisely why agencies, rather than advertisers directly, are being targeted. Reva Minkoff and Zack Simms both noted uncertainty about the specific mechanism - neither could immediately identify how responding to a scam lead would provide access to an agency's MCC account. Julie Friedman Bacchini, who works with clients on digital advertising efficiency, said she would want to add the attack vector to her MCC safety checklist but needed to understand the pathway more clearly.
One clarifying comment came from Scott Clark, who noted the distinction between managing an MCC and being managed by one. The concern is not simply that a scammer emails an agency. The concern is what happens after the "client" is onboarded. Julie Friedman Bacchini described a situation at her own agency: a fake prospect wanted to schedule a meeting and, as part of that meeting, wanted to grant the agency access to an account. "I can only assume," she wrote, "was their way in to hijack my account." The attack vector, in other words, is not email alone. It is the account linking process itself.
MCC account access: the structural risk
An MCC, or Manager account, allows an agency to manage multiple Google Ads accounts from a single interface. Access is granted hierarchically. When a client links their account to an agency's MCC, that agency gains operational control. The inverse scenario - an agency accepting access to an account they believe belongs to a legitimate client - is where fraud can enter the system.
Google has previously updated its third-party policy to address compliance across these account hierarchies, introducing severe penalties for third-party partners who enable significant or sustained violations of Google Ads policies. Separately, Google has also introduced policies under which individual accounts may face suspension if linked to a manager account that is found to be in violation - a policy that creates cascading risk across entire agency account structures.
The security implications are considerable. Google Ads introduced business email requirements as a security enhancement, requiring account administrators to transition users from personal to business email addresses. That measure addressed one vector - the use of unverifiable personal accounts for platform access. But it does not address social engineering tactics aimed at getting agencies to grant access voluntarily.
Phillip Barnhart, a senior marketing technology manager, commented that the detection sequence Jakober described was precisely right - and noted that the redirect technique on the spoofed domain was something many people would have missed entirely. Andrew Goodman of Page Zero Media acknowledged the pattern was familiar. According to Goodman, his agency had "seen a steady stream of these over the past 12-18 months" and had developed multiple verification approaches beyond LinkedIn alone.
Ginny Marvin's response
Ginny Marvin, Google's Ads Product Liaison, replied to the thread directly. Her comment was the most viewed among the reactions. According to Marvin, "Thanks for spreading the word and staying vigilant! Unfortunately, phishing schemes are a common method to gain unauthorized access to accounts. While we proactively monitor for unusual account activity to stop these incidents, advertisers must remain alert. Please mark any suspicious emails as spam, and if you believe your account has been" - the remainder linked to Google's documentation on recovering a compromised Google Ads account.
The response confirms that Google is aware of this category of attack. Marvin received three reactions on her comment, the most of any reply in the thread, suggesting her acknowledgment carried weight with the community.
Jakober herself added a note of attribution in the original post: "I believe Google Ads is on this and working hard to help agencies steer clear of these terrible attacks but we need to stay vigilant."
Fraud tactics growing more sophisticated
The type of spoofing described in this incident is distinct from but related to broader fraud trends tracked across the digital marketing industry. Domain spoofing - the use of look-alike domains designed to impersonate legitimate entities - has been documented for years in the advertising ecosystem, including a notable case in which the Financial Times discovered its domain was being impersonated across 10 ad exchanges, with FT estimating losses of approximately 1 million pounds per month.
The technique described in Jakober's post is an adaptation of that same logic, shifted from the publisher supply chain to the agency new business pipeline. Instead of spoofing an ad inventory source, the attackers spoof a prospective client. The redirect behavior - where the fake domain sends a visitor to the real company's website - is a level of sophistication that adds plausibility to the deception.
Broader fraud involving digital marketing platforms has accelerated across 2025 and into 2026. A PPC Land report from January 2026 documented scammers impersonating OpenAI with a fake beta testing invitation for a non-existent "OpenAI Advertising GPT" product distributed through Apple's TestFlight platform. According to Adriaan Dekker, who issued the public warning, "Scams using well-known AI brands are increasing fast." That case exploited the credibility of genuine OpenAI announcements around advertising tools - creating confusion that fraudsters used to make phishing invitations appear plausible to professionals tracking the company's legitimate developments.
The common thread is the exploitation of professional credibility - whether that is a major brand name, a Google product announcement, or the ordinary business pipeline of a marketing agency.
What the incident reveals about verification gaps
Jakober's post outlined a detection sequence that several practitioners found instructive. The full checklist she described works as follows: verify the sender's email domain and the URL it resolves to; search for the sender on LinkedIn; scrutinize the content of any response against publicly available company information and Google Ad Transparency data; run a Whois check on the domain to establish registration date; and, if in doubt, contact the company being impersonated directly through verified channels.
Each step individually is standard practice. The combination, applied in sequence, is what caught the fraud. The domain redirect - where the fake domain resolves to the real company's site - is specifically designed to defeat the first check in isolation.
Jonny Swift, a freelance PPC specialist, replied to the thread with a practical question: he had received a similar inquiry and wanted to know whether the scammer's domain began with the letter "V" - suggesting he suspected the same operation was running multiple fake domains simultaneously.
Chris Avery, who works with e-commerce brands on Google Ads, questioned specifically whether the fraud involved a domain starting with "Verder." The speculation, if accurate, would indicate a structured fraud campaign operating under a naming convention - a further sign of organized rather than opportunistic criminal activity.
Industry context
The advertising industry has faced escalating fraud challenges across several dimensions. Google's own Ads Safety Report, released April 16, 2025, documented that the company suspended 39.2 million advertiser accounts in 2024, representing a 208% increase compared to 12.7 million suspensions in 2023. Google also blocked or removed over 415 million ads associated with scam violations. Those figures reflect platform-side enforcement. The incident Jakober describes is a social engineering attack that operates before platform mechanisms can engage.
The agency vulnerability is also structural. Agencies operate under a model of trust with new business prospects - the entire pipeline depends on responding to inbound leads without extensive due diligence on every inquiry. Scammers are exploiting that operational norm. As Anthony Nichols, founder of a boutique performance marketing agency, observed in the thread, the fake submissions were arriving with frequency: "we have gotten three of these this week, first one was exciting and then you realize pretty quick they are fake."
Timeline
- September 28, 2017: Financial Times discovers domain spoofing across 10 ad exchanges, estimating losses of approximately 1 million pounds per month - an early documented case of brand impersonation in the advertising supply chain.
- May 19, 2024: Google Ads announces a security feature requiring account administrators to transition users from personal to business email addresses for managing accounts.
- October 15, 2024: Google tightens third-party policy for ad agencies, introducing immediate suspension and permanent bans for partners who enable significant or sustained Google Ads policy violations.
- October 21, 2024: A Google Ads representative makes unauthorized changes to a client account, raising questions about access management and account security across agency structures.
- January 25, 2026: Scammers distribute fake "OpenAI Advertising GPT" TestFlight invitations targeting digital marketing professionals, exploiting genuine OpenAI advertising announcements.
- June 6, 2025: Google introduces updated third-party policy stating individual accounts may face suspension if linked to a manager account in violation - creating cascading risk across agency MCC structures.
- April 7, 2026: Fraudulent domain impersonating a large global conglomerate is registered, three days before the scam lead arrives at Group Twenty Seven.
- April 10, 2026: Pauline Jakober publishes a detailed account on LinkedIn of the scam attempt, drawing responses from across the paid media community including Google's Ads Product Liaison Ginny Marvin.
Summary
Who: Pauline Jakober, Founder of Group Twenty Seven and a paid media expert, along with dozens of digital advertising agency professionals who reported similar experiences. Ginny Marvin, Google's Ads Product Liaison, responded directly in the thread.
What: A coordinated fraud campaign is targeting digital advertising agencies with fake high-value client leads. Scammers register look-alike domains that redirect to legitimate company websites, impersonate corporate marketing contacts, and attempt to gain access to agency MCC (Manager) accounts through the onboarding process. The fraudulent domain in this case was registered on April 7, 2026 - three days before the inquiry arrived.
When: The scam attempt occurred in the days before April 10, 2026, when Jakober published her warning publicly. Multiple practitioners in the thread reported receiving similar inquiries over the preceding 12 to 18 months, with some agencies receiving three in a single week.
Where: The fraud operates through website contact forms, targeting digital advertising and PPC agencies that manage Google Ads accounts on behalf of clients. The impersonation technique uses domain spoofing combined with legitimate website redirects to pass initial scrutiny.
Why: Agencies represent an attractive target because they operate Manager (MCC) accounts with access to multiple client advertising accounts. Social engineering attacks that result in fraudulent account linking could give attackers access to ad spend, billing information, and campaign data across entire agency portfolios. The professional norm of responding to inbound new business inquiries creates the opening that these attacks exploit.