The “Server (IMAP) Session Authentication” email scam is a type of phishing attack where fraudsters send emails claiming your email account access has been restricted due to irregular activity. These emails often include a button like “CONFIRM AUTHENTICATION!” that leads to a fake sign-in page, such as grandiose-dandy-actress.glitch, designed to steal your login credentials.
Server (IMAP) Session Authentication Email Scam Overview
The “Server (IMAP) Session Authentication” email scam is classified as a phishing, scam, social engineering, and fraud threat. It targets users by falsely claiming that their email access has been restricted due to irregular activity, tricking them into taking action.

These emails are often part of widespread spam campaigns designed to make recipients follow the instructions, exposing their login information and personal data. For this, they employ phishing sites that resemble a genuine service provider page, with a sign-in form that collects all inputs. Among the examples of such sites is grandiose-dandy-actress.glitch, which is hosted at IP address 151.101.66.59.
The scam’s potential damages include loss of sensitive private information, monetary loss, and identity theft, with symptoms like unauthorized online purchases, changed account passwords, and illegal computer access. Distribution methods include deceptive emails, rogue online pop-up ads, search engine poisoning, and misspelled domains.
Mechanics of the Scam
The scam operates by sending emails claiming the security system detected suspicious activity, restricting account access, including the ability to send emails. These emails instruct users to press “CONFIRM AUTHENTICATION!” to recover access, redirecting them to phishing sites disguised as email sign-in pages. For instance, clicking the button leads to domains like grandiose-dandy-actress.glitch[.]me (VirusTotal scan report), where users enter their email address and password, inadvertently exposing their accounts.
Once credentials are stolen, scammers can hijack linked accounts, platforms, and services, stealing identities for emails, social networking, and social media. They may request loans or donations from contacts, friends, or followers, promote additional scams, and spread malware by sharing malicious files or links.
Finance-related accounts, such as e-commerce, online banking, digital wallets, and money transferring services, are particularly vulnerable, enabling fraudulent transactions and online purchases. This results in severe privacy issues, financial losses, and potential identity theft, amplifying the scam’s impact.
Why Are Such Scams Prevalent?
Paradoxically, this is not a unique fraud, but rather a massive phenomenon. Moreover, we have a separate post about a fraud that is very similar to this one, and this phenomenon has an explanation. The “Server (IMAP) Session Authentication” email scam and similar phishing schemes have surged in popularity due to their simplicity and effectiveness in exploiting human psychology. These scams rely on urgency and fear, which is a fail-safe mechanism.
Scammers craft these emails with just enough technical jargon – like “IMAP session authentication” – to sound credible, especially to less tech-savvy individuals, while keeping the structure basic enough to mass-produce. The low effort required to tweak the text slightly for each campaign, combined with the high potential reward of stolen credentials or financial access, makes this approach a go-to for cybercriminals.
Another reason for their prevalence is the sheer scale and accessibility of email as a target. With billions of email users worldwide, and the availability of mailbox addresses after multiple leaks, even a tiny success rate yields significant profits. These scams are often distributed through automated spam campaigns, reaching thousands or millions of inboxes at minimal cost.
The similarity also helps them blend into legitimate correspondence, as users are accustomed to routine account alerts from real services. Moreover, the lack of robust security awareness among many users – coupled with the persistence of legacy protocols like IMAP, which lack modern safeguards – creates a fertile ground for these scams to thrive.
Finally, the adaptability and low detection risk keep these scams in heavy rotation. Scammers can quickly alter domains, email addresses, or phishing page designs to evade filters and antivirus software, staying one step ahead of automated defenses. This efficiency explains why such scams, despite their repetitive nature, remain a staple of cybercrime in 2025.

How to Protect Against Email Scams?
To avoid falling victim to Server (IMAP) Session Authentication scams (like any other scams) it is important to pay attention to details. For example, if such an “official” notification comes from an address that ends in @gmail.com or @hotmail.com, it is a guaranteed scam. Real alerts come from addresses that end in @accounts.google.com and @microsoft.com. This is an invariable rule created to allow users to distinguish between personal accounts and corporate accounts.
The second recommendation is to use anti-malware software with Internet Security. This prevents a phishing web page from being opened and downloaded if the user clicks on a link in an e-mail. I recommend GridinSoft Anti-Malware as it does an excellent job.