Google OAuth Security Breach: Hackers Exploit Abandoned Accounts. Here is what to know.
A critical flaw in Google’s OAuth implementation has recently been exposed, allowing attackers to gain access to abandoned accounts. This vulnerability, discovered by researchers at Trufflesecurity, affects accounts linked to various software-as-a-service (SaaS) platforms.
The Discovery
Trufflesecurity researchers identified the flaw last year and reported it to Google on September 30. Initially, Google dismissed the issue as a “fraud and abuse” problem rather than an OAuth or login issue. However, after the issue was presented at the Shmoocon conference in December, Google reopened the case and awarded the researchers a $1337 bounty.
How the Flaw Works
The flaw lies in Google’s “Sign in with Google” feature. When attackers purchase the domain of a defunct startup, they can recreate email accounts for former employees. These recreated accounts can then be used to log into services like Slack, Notion, Zoom, and various HR platforms. Although attackers cannot access old emails, they can extract sensitive data such as tax documents, insurance information, and social security numbers.
The Scale of the Problem
The researchers found that there are over 100,000 defunct domains available for purchase. With an average of 10 employees per startup using 10 different SaaS tools, this vulnerability potentially affects millions of user accounts. The issue is exacerbated by the fact that Google’s OAuth system relies on domain-based claims, which remain valid even when domain ownership changes.
Proposed Solutions
To address this issue, researchers suggest that Google introduce immutable identifiers, such as a unique and permanent user ID and workspace ID tied to the original organization. SaaS providers can also implement additional measures like cross-referencing domain registration dates and enforcing admin-level approvals for account access.
Google’s Response
Google has acknowledged the issue and recommends that customers properly close out domains and follow best practices to mitigate the risk. However, as of now, a fix has not been implemented, and the flaw remains exploitable.
Conclusion
This flaw highlights the importance of proper domain management and the need for robust security measures in authentication systems. As attackers continue to exploit vulnerabilities, it is crucial for companies to stay vigilant and implement necessary safeguards to protect user data.
You think you have a story worth everyone’s time? SUBMIT A STORY and we will publish it
Share this content:
Post Comment