Robinhood account creation flaw abused to send phishing emails
Bleeping ComputerArchived Apr 29, 2026✓ Full text saved
Online trading platform Robinhood's account creation process was exploited by threat actors to inject phishing messages into legitimate emails, tricking users into believing their accounts had suspicious activity. [...]
Full text archived locally
✦ AI Summary· Claude Sonnet
Robinhood account creation flaw abused to send phishing emails
By Lawrence Abrams
April 27, 2026 07:11 PM 0
Online trading platform Robinhood's account creation process was exploited by threat actors to inject phishing messages into legitimate emails, tricking users into believing their accounts had suspicious activity.
Starting last night, Robinhood customers began receiving "Your recent login to Robinhood" emails stating that an "Unrecognized Device Linked to Your Account" was detected, containing unusual IP addresses and partial phone numbers.
"We detected a login attempt from a device that is not recognized," reads the phishing email. "If this was not you, please review your account activity immediately to secure your account."
RobinHood phishing email
Reddit: @OtisAndPeanut
Included in the email was a button titled "Review Activity Now", which led to a phishing site at robinhood[.]casevaultreview[.]com, which is now down.
However, screenshots on Reddit indicate that the site was likely used to try to steal Robinhood credentials.
What made the emails convincing is that they came from the legitimate Robinhood email address noreply@robinhood.com and passed SPF and DKIM email security checks.
Exploiting Robinhood account creation onboarding flaw
Attackers abused Robinhood to generate phishing emails by exploiting a flaw in the company's onboarding process that allowed them to inject arbitrary HTML into its account confirmation emails.
BleepingComputer confirmed that when a new Robinhood account is registered, the company automatically sends a "Your recent login to Robinhood" email to the associated address, containing the registration time, IP address, device information, and approximate location.
To inject the phishing message, threat actors modified their device metadata fields to include embedded HTML, which Robinhood did not properly sanitize.
This HTML was then injected into the Device: field of the account creation email, causing it to render as a fake "Unrecognized Device Linked to Your Account" message.
To target Robinhood customers, attackers likely used lists of known customer email addresses from previous data breaches. In November 2021, Robinhood suffered a data breach impacting 7 million customers, with the data later offered for sale on a hacking forum.
The attackers also used Gmail's dot aliasing behavior, where adding periods to an address does not change its destination, allowing them to register accounts using variations of real email addresses while still delivering the messages to the intended recipients.
As a result, recipients received what appeared to be a standard login alert, but with an embedded phishing section warning of "unrecognized activity" and urging them to review their account.
Robinhood confirmed the incident in a statement posted to X.
"On Sunday evening, some customers received a falsified email from noreply@robinhood.com with the subject line 'Your recent login to Robinhood.'," posted RobinHood.
"This phishing attempt was made possible by an abuse of the account creation flow. It was not a breach of our systems or customer accounts, and personal information and funds were not impacted."
BleepingComputer has confirmed that Robinhood has fixed this flaw by removing the Device: field that was previously abused from their account creation emails.
Robinhood advises users who received the message to delete it and avoid clicking any links.
99% of What Mythos Found Is Still Unpatched.
AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.
At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what's exploitable, proves controls hold, and closes the remediation loop.
Claim Your Spot
Related Articles:
Apple account change alerts abused to send phishing emails
New ATHR vishing platform uses AI voice agents for automated attacks
Microsoft says Outlook.com outage is causing sign‑in failures
Canada arrests three for operating “SMS blaster” device in Toronto
New BlackFile extortion group linked to surge of vishing attacks