Critical Flaw in Google’s OAuth Risks Data of Millions From Defunct Startups

In a striking revelation that has sent shockwaves through the tech industry, a critical flaw in Google’s widely-utilized “Sign in with Google” OAuth authentication system has been identified. This vulnerability potentially exposes millions of user accounts to data theft, posing significant risks, particularly to individuals who previously worked for now-defunct startups. The flaw stems from the manner in which Google’s OAuth interacts with domain ownership, enabling malicious actors to exploit abandoned domains and gain unauthorized access to user accounts.

Vulnerability in the OAuth System

Exploiting Abandoned Domains

When users sign in using Google’s OAuth, Google sends third-party services a set of claims, including the user’s email address and a domain-specific identifier (hd claim). These claims are then used by services like Slack, Notion, and Zoom to authenticate users. However, if a startup goes out of business and its domain is subsequently purchased by an attacker, the new domain owner can recreate email accounts belonging to former employees and gain entry into various SaaS platforms. This breach can lead to exposure of highly sensitive information such as Social Security numbers, tax documents, and private messages.

The problem is further compounded by the high failure rate of tech startups, many of which use Google Workspace for their email services. When these companies shut down, their domains become prime targets for exploitation. Using data from Crunchbase, a security researcher estimated that upwards of 100,000 defunct domains are vulnerable, potentially impacting more than 10 million user accounts. This statistical risk underscores the urgency of addressing the flaw to prevent widespread data breaches.

The Inconsistency of the Sub Claim

Google’s OAuth system includes a unique user identifier known as the sub claim, designed to prevent the issue of unauthorized access. However, the sub claim’s inconsistent application renders it ineffective as a verification tool. Many platforms rely solely on email and domain claims for authentication. Since these claims remain valid regardless of ownership changes, this allows attackers to gain unauthorized access merely by controlling the domain.

The deficiency in reliable verification necessitates a more robust solution. The security researcher proposed an implementation of two immutable identifiers within Google’s OpenID Connect (OIDC) claims. One should be a unique user ID that remains consistent over time, and the other a unique workspace ID tied to the domain. This approach ensures that user authentication remains secure even if domain ownership changes. Google’s initial response dismissed the report as a non-OAuth vulnerability, but their stance shifted following the researcher’s presentation at ShmooCon. Acknowledging the issue, Google awarded a bounty and pledged to devise a fix. However, specific details and timelines for the solution remain undisclosed.

Potential Solutions and Recommendations

Steps for Third-Party Service Providers

Currently, third-party service providers face significant hurdles in mitigating this vulnerability without Google’s active intervention. One immediate recommendation for users is to exercise caution when using “Sign in with Google” for critical services. Encouraging startups to adopt more secure single sign-on (SSO) solutions strengthened by two-factor authentication (2FA) remains essential. These measures can provide an additional layer of security and restrict unauthorized access.

Service providers can also introduce additional verification steps to bolster security. For example, integrating SMS code verification or requiring credit card validation during password resets can mitigate the potential risks. Such enhanced verification procedures would make it considerably more challenging for malicious actors to exploit dormant domains, thus protecting sensitive user data.

Google’s Role and the Path Forward

In a startling revelation that has rocked the tech community, a significant flaw has been discovered in Google’s widely-used “Sign in with Google” OAuth authentication system. This vulnerability has the potential to expose millions of user accounts to data theft, posing severe risks, especially for individuals who were once associated with now-defunct startups. The issue arises from the way Google’s OAuth handles domain ownership, allowing malicious actors to exploit abandoned domains. These cybercriminals can then gain unauthorized access to user accounts, putting sensitive personal and professional data at risk. This flaw highlights the need for robust security measures and constant vigilance in managing domain ownership and authentication processes. As the tech industry grapples with this discovery, it underscores the critical importance of securing digital identities and the systems designed to protect them. The response from Google and other tech giants will be closely monitored as they work to mitigate the risks and strengthen their authentication frameworks.

Explore more

How Will the 2026 Social Security Tax Cap Affect Your Paycheck?

In a world where every dollar counts, a seemingly small tweak to payroll taxes can send ripples through household budgets, impacting financial stability in unexpected ways. Picture a high-earning professional, diligently climbing the career ladder, only to find an unexpected cut in their take-home pay next year due to a policy shift. As 2026 approaches, the Social Security payroll tax

Why Your Phone’s 5G Symbol May Not Mean True 5G Speeds

Imagine glancing at your smartphone and seeing that coveted 5G symbol glowing at the top of the screen, promising lightning-fast internet speeds for seamless streaming and instant downloads. The expectation is clear: 5G should deliver a transformative experience, far surpassing the capabilities of older 4G networks. However, recent findings have cast doubt on whether that symbol truly represents the high-speed

How Can We Boost Engagement in a Burnout-Prone Workforce?

Walk into a typical office in 2025, and the atmosphere often feels heavy with unspoken exhaustion—employees dragging through the day with forced smiles, their energy sapped by endless demands, reflecting a deeper crisis gripping workforces worldwide. Burnout has become a silent epidemic, draining passion and purpose from millions. Yet, amid this struggle, a critical question emerges: how can engagement be

Leading HR with AI: Balancing Tech and Ethics in Hiring

In a bustling hotel chain, an HR manager sifts through hundreds of applications for a front-desk role, relying on an AI tool to narrow down the pool in mere minutes—a task that once took days. Yet, hidden in the algorithm’s efficiency lies a troubling possibility: what if the system silently favors candidates based on biased data, sidelining diverse talent crucial

HR Turns Recruitment into Dream Home Prize Competition

Introduction to an Innovative Recruitment Strategy In today’s fiercely competitive labor market, HR departments and staffing firms are grappling with unprecedented challenges in attracting and retaining top talent, leading to the emergence of a striking new approach that transforms traditional recruitment into a captivating “dream home” prize competition. This strategy offers new hires and existing employees a chance to win