Security is not a feature. It’s a priority — and one we take seriously every day.
This post is a straightforward account of how we think about phishing abuse on our platform and what we’re building to reduce the risk that our infrastructure is used as a vector for harm.
We identified a pattern of abuse in which bad actors were using our test sandboxes to trick users into granting OAuth access to accounts they didn’t intend to share. When we had sufficient understanding of the scope of the issue, we moved quickly.
Within hours of detection, our team identified the offending applications and grants, traced them to the malicious domains in question, and executed targeted operations to remove them from our systems. We coordinated across teams in real time to remove the applications and revoke the associated grants.
Nylas is an email, calendar, and contacts API — which means we sit close to important and personal data — people’s inboxes. Security is foundational to how we build and operate. You can review our full security posture on our security page.
Our approach to phishing and platform abuse rests on a few principles:
Speed matters. When we identify active abuse, our first priority is containment. We’d rather act on strong evidence quickly than wait for a complete picture while damage is being done.
We go to the source. In this case, that meant going beyond obvious indicators — not just deleting surface-level artifacts, but tracing the abuse to its root and working to remove it cleanly.
We operate across regions. Our infrastructure spans across multiple cloud environments. Remediation isn’t as simple as running one query — it requires coordinated action across systems, which is why we’ve invested in processes that let our teams act in parallel.
We build for the next one. After every incident, we ask: what would have caught this earlier? In this case, that question is driving improvements to validation and monitoring.
We’re actively exploring on a set of improvements that include:
This isn’t a complete list, and some of it is already in progress. Security work is never finished — it’s iterated.
If you’re a developer building on Nylas:
If you’re an end user, here’s how to check which apps have access to your account and remove anything that looks unfamiliar:
Revoke access – Go to your Google Account’s third-party connections page at myaccount.google.com/connections. Under “Access to your Google Account,” review the list of apps and select any you don’t recognize. From there you can remove access entirely.
Check your Sent folder for emails you did not send. Look for unexpected emails in your inbox particularly starred or unread messages from unfamiliar senders that you do not recall receiving. Check your Trash and All Mail for deleted messages you did not delete.
Secure your account – Review active sessions at myaccount.google.com/device-activity and sign out any unrecognized sessions.
Change your Google password – Enable or verify that two-factor authentication is active on your account. If you use the same password elsewhere, change it on those services too.
Check for financial exposure – If you received a fake payment-related email and entered card details, contact your bank immediately to report potential fraud and request a card replacement. Monitor your bank and card statements for unauthorized transactions.
While these steps may not cover every scenario, they’re a good place to start.
If you see a Nylas app you don’t recognize or didn’t authorize, remove it immediately and email us at [email protected] — we’ll investigate.
The instinct in security incidents is often to say as little as possible — to minimize alarm, to avoid giving bad actors a roadmap.
We landed on transparency, for a simple reason: developers and users who trust us with access to their data deserve to know how we handle problems when they arise. Not a sanitized press release, but a candid account of what happened and what we’re doing about it.
That’s the standard we’re holding ourselves to, and we believe it’s right for this situation.If you have questions, reach out to our security team at [email protected]. We’re listening.
You can also learn more about how Nylas approaches security at nylas.com/security
Director, Information Security