Not an April Fools joke
April 2, 2026
A phishing campaign is circulating right now that impersonates Paperless Post, the invitation and greeting card service. Several people in my client network have had their email accounts compromised by it in the past few days. This post covers how the attack works, what to do if you clicked the link, and how to protect yourself.
What it is: A fake Paperless Post invitation email, sent from someone you know whose account has been taken over.
What it looks like: A real-looking email with Paperless Post branding, a card image, and a "VIEW THE CARD" button. Subject lines vary — one example: "Memorable Milestone Celebration with Me."
What happens if you click: You land on a page that looks like an email login (Google, AOL, or other provider). If you enter your credentials, the attacker takes over your account and sends the same kind of email to your contacts.
What to do right now:
Best protection going forward: Set up a passkey on your Google account. It stops this attack cold.
Details on each of these below.
You receive an email from someone you know. The subject line is something like "Memorable Milestone Celebration with Me." The email looks like a standard Paperless Post invitation, complete with the Paperless Post logo, a card image, and a "VIEW THE CARD" button. The footer includes real Paperless Post unsubscribe and privacy links.
The email is sent from the person's actual email account through their provider's real mail servers. It passes every standard email security check. Spam filters do not catch it. There is nothing in the email that distinguishes it from a legitimate message.
The only indicator that something is wrong is where the "VIEW THE CARD" button takes you. Instead of going to paperlesspost.com, it goes to a different website controlled by the attacker.
Each new victim's version of the email is slightly different — the subject line, the card design, or the hook changes. But the mechanism is the same.
This campaign is not limited to Gmail. Accounts on AOL, Yahoo, and other providers have been compromised the same way.
Three things make this campaign effective:
You are most likely fine. Check your third-party app permissions (step 2 above) as a precaution — some phishing pages request app access instead of a password, and you may not remember clicking "Allow."
If your account sent phishing emails to your contacts, your first instinct may be to send everyone a warning. In practice, this is more complicated than it sounds.
If your contact list has dozens or hundreds of people, sending a bulk email creates its own problems. Most email providers limit how many messages you can send per day. A mass email from any account — compromised or not — can trigger spam filters, and a warning sent from the same account that just sent phishing emails may itself look suspicious to recipients.
A more practical approach is to triage your contact list:
Passkeys are the strongest defense. A passkey is tied to the real website's domain. A fake login page cannot request or use it. In one case I worked on this week, a passkey-protected account stopped this attack mid-stream — the phishing page accepted the email address but could not proceed because there was no password to capture.
If your Google account supports passkeys, set one up at myaccount.google.com → Security → Passkeys and security keys.
Two-step verification helps, but it's not enough on its own. Some phishing kits can intercept verification codes in real time. A hardware security key or passkey is more resistant to this.
Use a unique password for your email. If you use the same password across services and one of them gets breached, attackers can try that password on your email account. Your email password should not be shared with anything else.
Look at the URL before entering credentials. Before typing your password on any page, check the web address. A real Google sign-in will always be at accounts.google.com. Anything else is a fake, regardless of how the page looks.
This type of attack works because it exploits trust — a real email from a real person you know, using a brand you recognize. The technical defenses (spam filters, authentication checks) don't help here because the email is technically legitimate. The defense is knowing what to look for and using account protections that can't be phished.
If you need help securing your email account or checking whether yours was compromised, you can schedule a support session or text me at 651.274.0996.