Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Reviving Abandoned Online Domains: Accessing Services with Google Sign-In

  • adminadmin
  • January 17, 2025
  • data-breaches

Identity & Access Management,
Security Operations

Google Warns Against Using Emails as Unique Identifiers on Platforms

Prajeet Nair
(@prajeetspeaks) •
January 16, 2025

Abandoned Online Domains Unlock Services with Google Sign On
Image: Shutterstock

In a concerning revelation, a security researcher has demonstrated how the purchase of abandoned online domains associated with failed startups allowed him to reconstruct email addresses and gain access to sensitive third-party services. The implications of this situation underscore potential vulnerabilities in current identity management practices.

Dylan Ayrey, the researcher in question, detailed his findings in a recent report, describing how he successfully accessed platforms such as HR systems and Slack through the “Sign in with Google” option. This strategy led him to a trove of confidential records, including tax documents, payroll information, and Social Security numbers from the defunct businesses.

Ayrey attributes the significant security lapse to Google’s authentication methodology, specifically the reliance on domain ownership and email addresses. He pointed out that for third-party services that utilize Google’s sign-in feature, changes in domain ownership would not trigger any alerts or updates, allowing unauthorized access to previously secured accounts.

Contrary to Ayrey’s assertions, Google maintains that the root of the issue lies with the third-party services, which have inappropriately substituted email identifiers for a more robust Google sign-in ID token. According to Google, the sub field is intended to be a stable identifier, unaffected by changes in domain ownership.

Despite the potential for domain ownership changes to cause disruptions, Google asserts that the incidence of sub field alterations remains minimal—approximately 0.04% of all logins—though this statistic may translate into substantial account lockouts for larger organizations. Google representatives have expressed willingness to review any evidence disputing their claims regarding the stability of the sub field.

Following his initial contact with Google in September 2024 about these vulnerabilities, Ayrey noted that the company had declined to recognize the situation as a bug, insisting that the sign-in feature was functioning as designed. His subsequent presentation of these findings at the Shmoocon conference resulted in Google awarding him a bounty of $1,337, a nod to the hacker culture fond of numerical symbolism.

In response to the growing concerns about domain transitions, Google has urged organizations to properly manage their accounts, advising those closing down operations to cancel their Google Workspace subscriptions. The company has also reiterated its stance that email addresses should not serve as unique user identifiers to enhance security.

This situation exemplifies the risks associated with identity management system inadequacies, highlighting tactics from the MITRE ATT&CK framework such as initial access and credential dumping, which could feasibly characterize Ayrey’s exploitation method. Businesses must remain vigilant against potential vulnerabilities and take proactive steps to protect sensitive information from unauthorized access.

Reporting contributed by David Perera from Information Security Media Group in Washington, D.C.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Android Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T AWS Change Healthcare CISA Cisco Cloudflare cloud security CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security ESET Facebook FBI Fraud Management GitHub Google healthcare HIPAA Kaspersky LockBit machine learning Malware Mandiant Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salesforce Telegram Trend Micro Windows

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

Court Dismisses Investor Lawsuit Regarding CrowdStrike Software Update

  • January 15, 2026

Gallagher Expands on Cyber Breach and Privacy Responsibilities in Australia

  • January 15, 2026

Facebook CEO Zuckerberg’s Twitter and Pinterest Accounts Compromised! The Password Revealed…

  • January 15, 2026

Verizon Service Disruption Experienced Nationwide

  • January 15, 2026

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: [email protected]
Phone: +1 (914) 2943243

Copyright © 2026 - Breachspot, Security Breaches Spotted