Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Reclaiming Abandoned Online Domains Through Google OAuth Services

  • adminadmin
  • January 17, 2025
  • data-breaches

Identity & Access Management,
Security Operations

Google Issues Warning on Using Emails as Unique Identifiers for Authentication

Prajeet Nair (@prajeetspeaks)
• January 16, 2025

Abandoned Online Domains Unlock Services With Google OAuth
Image: Shutterstock

A recent investigation revealed a critical security risk associated with Google’s authentication methods, particularly concerning the use of email addresses as unique identifiers. Security researcher Dylan Ayrey acquired abandoned domains from defunct startups, enabling him to recreate email addresses and potentially access sensitive third-party services linked to those companies.

Ayrey reported that he gained entry to various platforms, including HR systems and communication tools like Slack, by utilizing Google’s OAuth authentication. This access granted him the ability to retrieve sensitive data such as tax documents and Social Security numbers. The issue highlights a significant flaw in how domain ownership and emails are leveraged for authentication.

According to Ayrey, the vulnerability arises because third-party services using Google’s authentication protocols do not adequately account for changes in domain ownership. He emphasized that alterations in ownership would not be detected, thereby allowing unauthorized access. Google, on the other hand, argues that the responsibility lies with these third-party platforms, which should be utilizing a more robust unique ID token rather than relying on emails.

To strengthen their position, Google pointed out the inconsistency associated with the sub field, which is meant to serve as a unique identifier. Ayrey claimed that a minor percentage, around 0.04%, of logins may result in changes to this identifier, which could translate into significant account issues at larger organizations. Google has maintained that they see no evidence supporting claims of immutability regarding the sub field.

In response to being informed about the issue by Ayrey in September 2024, Google reportedly dismissed the concern, asserting that their authentication processes were operating as designed. Nevertheless, following his upcoming presentation at Shmoocon, Ayrey received a bounty of $1,337 from Google, in recognition of his work in uncovering this vulnerability.

Google has subsequently advised businesses that are shutting down to cancel their Google Workspace subscriptions, enhancing guidelines that assert email accounts should not serve as unique user identifiers. In their rebuttal, Google emphasized that comprehensive protections are already in place and that fasting changes were unnecessary.

These developments resonate with broader themes in cybersecurity, particularly concerning identity and access management vulnerabilities. As organizations increasingly rely on third-party services with OAuth implementations, this incident underscores the imperative for businesses to prioritize the security of their authentication frameworks and rethink their next steps to fortify against similar security lapses.

Additional reporting contributed by Information Security Media Group’s David Perera in Washington, D.C.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Android Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T AWS CISA Cisco Cloudflare cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption ESET Facebook FBI Fraud Management GitHub Google healthcare HIPAA Kaspersky machine learning Malware Mandiant Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salesforce Telegram Trend Micro Windows

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

The Importance of Security Culture in Reducing Cyber Risk

In an era where organizations have invested two decades in enhancing their security architectures, a stark reality has emerged: advanced tools and technologies alone cannot sufficiently mitigate cyber risks. As technology has evolved, so too have the tactics of cyber attackers, who are increasingly targeting human behavior rather than solely infrastructure vulnerabilities. Recent data shows that the initial breach vector is often not a technical exploit but rather the exploitation of human vulnerabilities.

According to Verizon’s Data Breach Investigations Report, human factors have been the leading cause of breaches for five consecutive years. The most recent report indicates that almost 60% of all breaches in 2024 involved a human element. However, it is essential to clarify a prevalent misconception: the notion that “people are the weakest link” wrongly places the blame solely on employees for breaches.

  • April 27, 2026

Public Exploit Combines Two Critical SAP Vulnerabilities, Leaving Unpatched Systems Open to Remote Code Execution

Date: Aug 19, 2025
Category: Vulnerability / Cyber Espionage

A new exploit has emerged that leverages two critical, now-patched vulnerabilities in SAP NetWeaver, putting organizations at significant risk of system compromise and data theft. This exploit chains CVE-2025-31324 and CVE-2025-42999 to bypass authentication and enable remote code execution, according to SAP security firm Onapsis.

  • CVE-2025-31324 (CVSS score: 10.0) – Lacks authorization checks in SAP NetWeaver’s Visual Composer development server
  • CVE-2025-42999 (CVSS score: 9.1) – Vulnerability due to insecure deserialization in the same server

These vulnerabilities were patched by SAP in April and May 2025, but not before they were exploited as zero-days by threat actors as early as March. Multiple ransomware and data extortion groups, including Qilin, BianLian, and RansomExx, have been seen exploiting these flaws, along with several espionage groups linked to China targeting critical infrastructures.

  • April 27, 2026

New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Techniques

August 19, 2025
Malware / Cyber Attack

Financial institutions, particularly trading and brokerage firms, are currently facing a new threat from a remote access trojan known as GodRAT. According to Kaspersky researcher Saurabh Sharma, this malware is spread through malicious .SCR (screen saver) files disguised as financial documents sent via Skype Messenger. Active as recently as August 12, 2025, the attacks utilize steganography to hide shellcode within image files, enabling the download of the malware from a command-and-control (C2) server. Since September 9, 2024, these screen saver artifacts have targeted regions including Hong Kong, the United Arab Emirates, Lebanon, Malaysia, and Jordan. Based on Gh0st RAT, GodRAT employs a plugin-based architecture to enhance its capabilities for gathering sensitive information and delivering additional payloads like AsyncRAT.

  • April 26, 2026

Exploitation of Apache ActiveMQ Vulnerability Leads to DripDropper Malware Deployment on Cloud Linux Systems

August 19, 2025
Linux / Malware

Threat actors are leveraging a nearly two-year-old security vulnerability in Apache ActiveMQ to gain persistent access to cloud-based Linux systems and install the DripDropper malware. In an unexpected turn, these unidentified attackers have been seen patching the exploited vulnerability after gaining access, likely to prevent further exploitation by others and to evade detection, according to a report from Red Canary shared with The Hacker News. “Follow-on command-and-control (C2) tools varied by endpoint and included Sliver and Cloudflare Tunnels, allowing for covert long-term control,” researchers Christina Johns, Chris Brook, and Tyler Edmonds noted.

The attacks exploit a critical security flaw in Apache ActiveMQ (CVE-2023-46604, CVSS score: 10.0), a remote code execution vulnerability that enables the execution of arbitrary shell commands. This issue was addressed in late October 2023 but has since faced significant exploitation.

  • April 26, 2026

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: info@breachspot.com
Phone: +1 (914) 2943243

Copyright © 2026 - Breachspot, Security Breaches Spotted