HomeMalware & ThreatsGoogle Sign On Unlocks Services for Abandoned Online Domains

Google Sign On Unlocks Services for Abandoned Online Domains

Published on

spot_img

In a recent development, a security researcher uncovered a critical security flaw involving the misuse of abandoned online domains and email addresses as unique identifiers for accessing third-party services. This revelation has raised concerns about the potential exposure of sensitive information, such as tax documents, pay stubs, and Social Security numbers, to unauthorized individuals.

The researcher, identified as Dylan Ayrey, detailed his findings in a blog post, revealing how he was able to exploit this security loophole to gain access to various services, including HR platforms and Slack, by using the “Sign in with Google” feature. The root cause of this vulnerability, according to Ayrey, lies in Google’s authentication methods, which rely on domain ownership and email addresses for verification purposes.

Google, on the other hand, refuted Ayrey’s claims, placing the blame on the third-party services that allowed email identifiers to substitute a unique ID token identifier, known as the “sub” field, associated with Google Sign In. The search giant asserted that the issue stemmed from a failure on the part of these services to properly implement secure authentication measures.

Ayrey highlighted the inconsistencies in the “sub” field, citing anecdotal evidence from a staff engineer at a major tech company who reported frequent changes in this identifier. While Google maintained that the “sub” field serves as an immutable and unique identifier, Ayrey’s research suggested otherwise, pointing to potential account lockouts and security risks resulting from domain ownership changes.

Upon initially reporting the issue to Google, Ayrey faced resistance from the company, which claimed that the Sign in with Google feature was functioning as intended and declined to acknowledge it as a security bug. However, following Ayrey’s presentation of his research at the Shmoocon conference, Google acknowledged the vulnerability and awarded him a bounty of $1337 as a token of recognition for his efforts.

In response to this incident, Google issued a statement advising customers to cancel their Google Workspace subscriptions when closing down their operations and reiterated the importance of not using email accounts as unique identifiers for user authentication. The company emphasized that existing security measures are sufficient to protect against such vulnerabilities and reiterated its commitment to ensuring the integrity of its authentication processes.

This latest security lapse underscores the ongoing challenges faced by organizations in safeguarding sensitive data and underscores the importance of implementing robust security measures to protect against potential breaches. As the cybersecurity landscape continues to evolve, it is imperative for companies to remain vigilant and proactive in addressing vulnerabilities to mitigate the risks posed by malicious actors.

With additional reporting from Information Security Media Group’s David Perera in Washington, D.C., this incident serves as a timely reminder of the critical importance of maintaining strong security controls and adopting best practices to safeguard sensitive information in an increasingly digital and interconnected world.

Source link

Latest articles

Attackers Trojanize Axios HTTP Library in Major NPM Supply Chain Attack

Rising Threats: The Axios Attack and the Persistent Danger of Supply Chain Vulnerabilities In a...

MIWIC26: Gizem Acar Tekin, CEO and Co-founder of Photarix

Recognizing Influential Figures in Cybersecurity: The Inspiring Journey of Gizem Acar Tekin Organized by Eskenzi...

Agentic AI Uncertainty Dominates Discussions at RSAC Conference

A Disorienting Future: The Rapid Proliferation of Agentic AI and Emerging Cyber Threats The landscape...

Cyber Briefing for March 31, 2026 – CyberMaterial

Recent Developments in Cybersecurity: A Comprehensive Overview In the fast-evolving landscape of cybersecurity, a range...

More like this

Attackers Trojanize Axios HTTP Library in Major NPM Supply Chain Attack

Rising Threats: The Axios Attack and the Persistent Danger of Supply Chain Vulnerabilities In a...

MIWIC26: Gizem Acar Tekin, CEO and Co-founder of Photarix

Recognizing Influential Figures in Cybersecurity: The Inspiring Journey of Gizem Acar Tekin Organized by Eskenzi...

Agentic AI Uncertainty Dominates Discussions at RSAC Conference

A Disorienting Future: The Rapid Proliferation of Agentic AI and Emerging Cyber Threats The landscape...