Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Reviving Abandoned Online Domains: Accessing Services with Google Sign-In

  • adminadmin
  • January 17, 2025
  • data-breaches

Identity & Access Management,
Security Operations

Google Warns Against Using Emails as Unique Identifiers on Platforms

Prajeet Nair
(@prajeetspeaks) •
January 16, 2025

Abandoned Online Domains Unlock Services with Google Sign On
Image: Shutterstock

In a concerning revelation, a security researcher has demonstrated how the purchase of abandoned online domains associated with failed startups allowed him to reconstruct email addresses and gain access to sensitive third-party services. The implications of this situation underscore potential vulnerabilities in current identity management practices.

Dylan Ayrey, the researcher in question, detailed his findings in a recent report, describing how he successfully accessed platforms such as HR systems and Slack through the “Sign in with Google” option. This strategy led him to a trove of confidential records, including tax documents, payroll information, and Social Security numbers from the defunct businesses.

Ayrey attributes the significant security lapse to Google’s authentication methodology, specifically the reliance on domain ownership and email addresses. He pointed out that for third-party services that utilize Google’s sign-in feature, changes in domain ownership would not trigger any alerts or updates, allowing unauthorized access to previously secured accounts.

Contrary to Ayrey’s assertions, Google maintains that the root of the issue lies with the third-party services, which have inappropriately substituted email identifiers for a more robust Google sign-in ID token. According to Google, the sub field is intended to be a stable identifier, unaffected by changes in domain ownership.

Despite the potential for domain ownership changes to cause disruptions, Google asserts that the incidence of sub field alterations remains minimal—approximately 0.04% of all logins—though this statistic may translate into substantial account lockouts for larger organizations. Google representatives have expressed willingness to review any evidence disputing their claims regarding the stability of the sub field.

Following his initial contact with Google in September 2024 about these vulnerabilities, Ayrey noted that the company had declined to recognize the situation as a bug, insisting that the sign-in feature was functioning as designed. His subsequent presentation of these findings at the Shmoocon conference resulted in Google awarding him a bounty of $1,337, a nod to the hacker culture fond of numerical symbolism.

In response to the growing concerns about domain transitions, Google has urged organizations to properly manage their accounts, advising those closing down operations to cancel their Google Workspace subscriptions. The company has also reiterated its stance that email addresses should not serve as unique user identifiers to enhance security.

This situation exemplifies the risks associated with identity management system inadequacies, highlighting tactics from the MITRE ATT&CK framework such as initial access and credential dumping, which could feasibly characterize Ayrey’s exploitation method. Businesses must remain vigilant against potential vulnerabilities and take proactive steps to protect sensitive information from unauthorized access.

Reporting contributed by David Perera from Information Security Media Group in Washington, D.C.

Source link

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Android Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T AWS CISA Cisco Cloudflare cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption ESET Facebook FBI Fraud Management GitHub Google healthcare HIPAA Kaspersky machine learning Malware Mandiant Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salesforce Telegram Trend Micro Windows

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

The Importance of Security Culture in Reducing Cyber Risk

In an era where organizations have invested two decades in enhancing their security architectures, a stark reality has emerged: advanced tools and technologies alone cannot sufficiently mitigate cyber risks. As technology has evolved, so too have the tactics of cyber attackers, who are increasingly targeting human behavior rather than solely infrastructure vulnerabilities. Recent data shows that the initial breach vector is often not a technical exploit but rather the exploitation of human vulnerabilities.

According to Verizon’s Data Breach Investigations Report, human factors have been the leading cause of breaches for five consecutive years. The most recent report indicates that almost 60% of all breaches in 2024 involved a human element. However, it is essential to clarify a prevalent misconception: the notion that “people are the weakest link” wrongly places the blame solely on employees for breaches.

  • April 27, 2026

Public Exploit Combines Two Critical SAP Vulnerabilities, Leaving Unpatched Systems Open to Remote Code Execution

Date: Aug 19, 2025
Category: Vulnerability / Cyber Espionage

A new exploit has emerged that leverages two critical, now-patched vulnerabilities in SAP NetWeaver, putting organizations at significant risk of system compromise and data theft. This exploit chains CVE-2025-31324 and CVE-2025-42999 to bypass authentication and enable remote code execution, according to SAP security firm Onapsis.

  • CVE-2025-31324 (CVSS score: 10.0) – Lacks authorization checks in SAP NetWeaver’s Visual Composer development server
  • CVE-2025-42999 (CVSS score: 9.1) – Vulnerability due to insecure deserialization in the same server

These vulnerabilities were patched by SAP in April and May 2025, but not before they were exploited as zero-days by threat actors as early as March. Multiple ransomware and data extortion groups, including Qilin, BianLian, and RansomExx, have been seen exploiting these flaws, along with several espionage groups linked to China targeting critical infrastructures.

  • April 27, 2026

New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Techniques

August 19, 2025
Malware / Cyber Attack

Financial institutions, particularly trading and brokerage firms, are currently facing a new threat from a remote access trojan known as GodRAT. According to Kaspersky researcher Saurabh Sharma, this malware is spread through malicious .SCR (screen saver) files disguised as financial documents sent via Skype Messenger. Active as recently as August 12, 2025, the attacks utilize steganography to hide shellcode within image files, enabling the download of the malware from a command-and-control (C2) server. Since September 9, 2024, these screen saver artifacts have targeted regions including Hong Kong, the United Arab Emirates, Lebanon, Malaysia, and Jordan. Based on Gh0st RAT, GodRAT employs a plugin-based architecture to enhance its capabilities for gathering sensitive information and delivering additional payloads like AsyncRAT.

  • April 26, 2026

Exploitation of Apache ActiveMQ Vulnerability Leads to DripDropper Malware Deployment on Cloud Linux Systems

August 19, 2025
Linux / Malware

Threat actors are leveraging a nearly two-year-old security vulnerability in Apache ActiveMQ to gain persistent access to cloud-based Linux systems and install the DripDropper malware. In an unexpected turn, these unidentified attackers have been seen patching the exploited vulnerability after gaining access, likely to prevent further exploitation by others and to evade detection, according to a report from Red Canary shared with The Hacker News. “Follow-on command-and-control (C2) tools varied by endpoint and included Sliver and Cloudflare Tunnels, allowing for covert long-term control,” researchers Christina Johns, Chris Brook, and Tyler Edmonds noted.

The attacks exploit a critical security flaw in Apache ActiveMQ (CVE-2023-46604, CVSS score: 10.0), a remote code execution vulnerability that enables the execution of arbitrary shell commands. This issue was addressed in late October 2023 but has since faced significant exploitation.

  • April 26, 2026

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: info@breachspot.com
Phone: +1 (914) 2943243

Copyright © 2026 - Breachspot, Security Breaches Spotted