<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1822615684631785&amp;ev=PageView&amp;noscript=1"/>

Google’s Safe Browsing program made my week hell

Google’s Safe Browsing program protects a lot of people from phishing, malware, and other harmful sites. In fact, it’s so pervasive that it’s not just used by Chrome. Google has managed to get competing browsers, Safari and Firefox, to use it as well. The list of websites blacklisted though is all maintained by Google, giving Google a disproportionate amount of power over what sites are seen versus blocked.

I’ll explain what happened during our harrowing week in a moment; but first, let me share an update about Google’s Safe Browsing API:

  • Effective September 11, 2019, the Safe Browsing API is limited to non-commercial use only. It is a free service.
  • If you’re a non-commercial user, you can continue to use the Safe Browsing API, and you don’t need to take any action. Also, academic researchers and NGOs will continue to be eligible to use the Safe Browsing API at no cost. 
  • Commercial users, like GMass, are required to switch to the Web Risk API by November 11, 2019. This version is a paid service, and if you’re a commercial user, as we are, then you’ll need to switch. Also, you’ll need to apply and be approved to use the API, so don’t wait.
  • Both APIs are directed at protecting users from malware and phishing, but the new Web Risk API is designed specifically for larger users.

And now, back to our story …

What happened?

At the beginning of last week, my team suddenly had a deluge of complaints from users reporting that their links had stopped working, their sending limits had been reduced, and they’d received phishing notifications from Google. Ouch! Upon investigating, we found that the tracking domains they use in their email campaigns had ended up on the Google’s Safe Browsing blacklist, and when people clicked links in their campaigns, they ended up on this scary bright red Google warning page.

There’s the rub. Not only does Google list actual phishing sites, but any sites that re-direct to them as well. That makes it so that any providing click-tracking services, including URL shorteners and email marketing service providers, have to be extra cautious.

In slogging through our logs we found that a Netflix phisher had managed to send 200 emails through GMass on Sunday, February 17. Here’s the email he sent. Notice that the URL behind the link is highlighted at the bottom. In this case, the URL https://www.gregsimages.com/cgi-bin led to the red screen of death, as did our click-tracked links that redirected to this URL.

The effect of being listed goes beyond just the web

What happens to your email campaigns when you send a URL that’s on this list? Gmail makes you feel like the devil reincarnate.

  1. Your Gmail account becomes severely limited and unable able to send any substantial volume of emails.
  2. If you do manage to send an email with a blacklisted link, and that link is clicked, you’ll scare the bejesus out of them with the red screen of death.
  3. Your past campaigns are affected too, if someone pulls up one of those old emails and clicks a link.
  4. If people reply to you, the reply will still have the original email at the bottom, with the link that you sent, and Google will flag the reply to you as a potential scam too.

Obviously not a good look for an email marketer.

What was actually affected?

In our case, when we got the notice that link.wordzen.com was listed, I wanted to isolate which link.wordzen.com URLs were affected.

Using the public Safe Browsing lookup tool, which is different from the private tool everyone has in their Search Console, I found that plugging in just link.wordzen.com gave this result, indicating that some URLs were affected and others weren’t:

Just “link.wordzen.com” indicates that SOME pages are unsafe.

But if I plugged in our original click tracking structure, link.wordzen.com/x/c, then the issue was clear that all /x/c links were blacklisted

Using our old click-tracking link structure shows that all URL redirects using link.wordzen.com are unsafe.

Curious, though, I wondered what would happen if I changed the URL slightly, so I tried link.wordzen.com/x/d and found that those URLs came back clean

Slightly altering the link structure makes the link safe again.

You’ll see below that this discovery led me to change the structure of a click-tracked link.

Some nonsense associated with the Safe Browsing Program

1. Despite claims of transparency, it’s anything but.

As soon as your domain has been listed, you will probably want to know the URL that caused the issue. Unfortunately for you, Google won’t tell you. In the Search Console you might see this:

If you received an email notification about the blacklisting, that will have a portion of the URL.

The email notification you receive provides some clue as to the offending URL, while the notice in the Search Console gives you NO worthwhile info.

For my purposes, this did not help at all, because every click-tracked link in the history of GMass starts with /x/c. The important stuff is all after that part, and that’s the part that Google eliminates from its reports. How this qualifies as transparency is beyond me.

So what do you do now? You crawl through your logs and figure out what happened. In my case, I ran all sorts of analyses, starting with a time distribution analysis of all clicks in the last 72 hours, looking for anomalies. I also discovered my new best friend, a tool from Microsoft called Log Parser Studio, that lets me run SQL queries against my IIS log files, without importing the log files into a database. Slick! That’s how I concluded that the aforementioned Netflix phisher was the culprit.

2. The Safe Browsing API has been broken since day one.

I’m not the only one who’s frustrated over the seemingly useless Safe Browsing API.

Here’s a screenshot showing the listing of link.wordzen.com.

Here’s a screenshot showing the API result:

So with a useless API, how does one monitor whether new URLs have been listed or old URLs have been marked safe? I used Upwork to quickly a hire a team of Virtual Assistants in the Philippines to manually enter all 1,400 of our customers’ tracking domains into the web lookup tool and to do so every 12 hours until further notice.

In case you’re a C# programmer and want to try this yourself, here’s the code:

            string apikey = "AIzaSyBnIDLCc*************z4twxdx28";
            string payload = @"{
                ""client"": {
                  ""clientId"":      ""gmass"",
                  ""clientVersion"": ""1.0.0""

                ""threatInfo"": {
                  ""platformTypes"":    [""WINDOWS""],
                  ""threatEntryTypes"": [""URL""],
                  ""threatEntries"": [
                    {""url"": ""http://link.wordzen.com""}

            using (var client = new HttpClient())
                var content = new StringContent(payload, Encoding.Default, "application/json");
                var response = client.PostAsync($"https://safebrowsing.googleapis.com/v4/threatMatches:find?key={apikey}", content).Result;
                string resultContent = response.Content.ReadAsStringAsync().Result;

There is also a .NET client library for the Safe Browsing API, but I chose not to use it because I wanted to be in control of the exact JSON payload request so that I knew that I wasn’t making a mistake.

3. Reviews take a long time to process.

Despite Google’s claims that a phishing URL will be reviewed within 24 hours and a malware URL within 72 hours, I found it took more like 120 hours (5 days). After a week of hell though, there’s no sweeter email one can receive than this, clearing your domain off the dreaded blacklist:

You can submit each URL for review, and in our case, we did it for hundreds of our customers too.

How I worked around the blacklisting of 300 domains

During the time our customers’ domains were listed, we couldn’t just sit idle waiting for Google, because customers needed to send their email campaigns out. We took a number of counter-measures and you can take these too, should you find yourself in this situation.

1. Removed all affected customer tracking domains from their accounts

The first step we took was to remove all the affected tracking domains from users’ accounts, causing them to fall back to our shared tracking domain, which for paying users, is a clean domain based on Amazon’s AWS domain. That eliminated the issue in future campaigns.

2. Altered structure of click tracking link

I felt a little shady making this change system-wide, but it turned out it worked, and saved me from an ever-growing mob of angry users. The old structure of a click-tracked link looked like:


By plugging various combinations of URL structures into the lookup tool, we noticed that the link above was flagged as dangerous, but if we made a simple change, changing the /c to /d, then the URL came back as safe, so we changed the structure of links to use /d instead of /c, like this:


Of course for backward compatibility, we made sure that the /c URLs still worked also.

Making this change allowed users to keep using their custom tracking domain, even if their tracking domain was still listed in the Safe Browsing system as a potential phishing domain.

3. Locked down how click-tracking works to prevent future issues

I should have implemented this from day one, but I could have never expected an evildoer to exploit this loophole. You may know that to set up a custom tracking domain, you create a sub-domain off your existing domain and set its CNAME to x.gmtrack.net. So in my case, link.wordzen.com has a CNAME to x.gmtrack.net and that’s what allows it to function as the tracking domain for my email campaigns. But let’s say that you set up link.yourdomain.com as your tracking domain. Before, you could substitute the domain portion of a URL with a different tracking domain, and the redirect would still work.

For example, you could substitute the “link.wordzen.com” portion of:


with any other user’s tracking domain, and the redirect to the GMass website would still work. This is what a recipient of the Netflix phishing email did. He substituted as many of our customers’ tracking domains as he could find into the URL that led to the phishing page, accessed those URLs, and then submitted them to Google’s Safe Browsing database.

Now, however, after locking it down, using a tracking domain that wasn’t originally associated with the link won’t automatically redirect the recipient to the website. Instead, an interstitial page will load. Try it with this link where I’ve substituted the tracking domain with a different user’s:



Been blacklisted by Google’s Safe Browsing program? Here are the things to know.

  1. Don’t use the API to monitor listings. It doesn’t work.
  2. The information in the Search Console is mostly useless. The better information is in the email notification about the listing.
  3. After fixing the issue, submit your site for review, but don’t expect an immediate resolution. It can take a week for delisting to occur.
  4. While you’re waiting on #3, try to work around the issue, like we did by altering the structure of click-tracking links. Listings in the Safe Browsing database seem to be based on a regex match, not every single URL at your domain.
  5. If all else fails, use this Wired article to track down the team of Google engineers that built the Safe Browsing product. There’s a list of names at the bottom. Use LinkedIn, Hunter.io, or any means necessary to track someone down.

More exciting tales…

This isn’t my only encounter with the Google Safe Browsing program. In September 2020, I faced another harrowing issue when the program blacklisted the domain we use with Zendesk. I also have an interesting story involving a Spamhaus blacklisting.

See why 99% of users say they’ve had their best deliverability ever with GMass

Email marketing, cold email, and mail merge all in one tool — that works inside Gmail


Download Chrome extension - 30 second install!
No credit card required
Love what you're reading? Get the latest email strategy and tips & stay in touch.

  1. Thank you for this information. I am in the middle of this hell right now with an elementary school! We’re an elementary school, using basic GSFE. We don’t even have a web site connected with our Google Domain. We don’t even do click tracking.

    Dealing with Google’s tech support has been a nightmare, who won’t tell me anything. I need their help to track down whatever the problem is, and they will not help me.

    I’m waiting on a site review now. Its only been 24 hours though.

  2. For the record, my site review came back clean and Google took us out of the blacklist. My nightmare lasted 6 days. This blog post was very helpful to me in tracking down what was wrong. Thanks.

  3. It s shocking to me that many people don t seem to care about their privacy. It seems to me that many comments on this page come from very tech savvy people who are well versed in Googles capabilities and strategies. But what about the millions who are not so savvy? Why would people have to find out about this change from a blog and not Google themselves? This is a pure and simple abuse of their market dominance and lack of transparency. Not good, thanks for the information Google is gone from my universe

  4. yesterday, my site has been hacked and some phishing pages uploaded on it, its currently blacklisted, i reset the host, installed everything again and requested a review in google search console, but after 3 days it still show a warning and blacklisted, i even didnt recieve any email or sth from google, any body have no idea to do this fatser? i really need to get of this blacklist, i will lose many customers…

  5. google like any corporation is headless, drivin only by profit margins, its a simple formula and clearly a asymmetric tradein there favor, if the risk is loosing a few million users now to gain every future users browsing data than that is a favorable trade. and of course sync is still opt in, sync data is the main service they offer you as trade for your valuable browsing data so if they can collect your valuble data without having to provide a expensive service that makes the trade even more asymmetric in there favore and that in the end is why i and many others dumped chrome, the only way google will ever care is if enough fuss is raised to hurt there reputation or bottom doller otherwise we are a calculated loss and most of the privacy concerned users didnt share data anways and earned less revenue. (sadly posted from f droid firefox )

  6. Hi Ajay, thanks for such an informative post. During my testing I stumbled upon many false positives, so I wonder if webrisk is a good choice as in the cases of high false positives there will be huge cost. How did you tackle false positives and costs associated with them? Any insights into current costs you guys incur will be highly appreciated. TIA.

  7. A very similar issue occurred recently to a client of ours. There are so many problems with Google Safe Browsing, but response time is in many ways the most egregious. Google wields too much power to effectively take a site offline by posting the red screen of hell if it finds malware, and then taking as much as 4-5 days to review and put it back!

    We need to get through to them to make a change to this process. It literally cost our client thousands of dollars (ecommerce site getting no orders) and it potentially costs us a client.

    Is a class-action suite the only way to get them to take notice? I hope not so perhaps creating some negativity publicity will get them to take notice and fix Safe Browsing.

    It starts by gathering webmasters and clients who have been affected together so we can have a unified voice. If you want to join, the effort, please comment here https://www.ndic.com/2023/02/06/the-totalitarian-regime-that-is-google-safe-browsing/ if you want to get involved and include any thoughts/suggestions on how to get through to Google on this issue!

  8. what happens when “Google Safe Browsing” deems the content of your page “unsafe”?

    I had them block any entire TLD based on 1 sub domain… and there was no email campaign… it was a simple laravel site.

    this is too much power… someone needs to sue the crap out of them… because they can END ANYONE AT ANY TIME

    they have the power to shut down and block ANYONE and we are at their mercy

Leave a Reply

Your email address will not be published. Required fields are marked *

Send your first campaign in a matter of minutes

No credit card required

Try GMass for free Then check out the quickstart guide to send your first mail merge email in minutes!


Share This