Critical Flaw in Google’s OAuth Risks Data of Millions From Defunct Startups

In a striking revelation that has sent shockwaves through the tech industry, a critical flaw in Google’s widely-utilized “Sign in with Google” OAuth authentication system has been identified. This vulnerability potentially exposes millions of user accounts to data theft, posing significant risks, particularly to individuals who previously worked for now-defunct startups. The flaw stems from the manner in which Google’s OAuth interacts with domain ownership, enabling malicious actors to exploit abandoned domains and gain unauthorized access to user accounts.

Vulnerability in the OAuth System

Exploiting Abandoned Domains

When users sign in using Google’s OAuth, Google sends third-party services a set of claims, including the user’s email address and a domain-specific identifier (hd claim). These claims are then used by services like Slack, Notion, and Zoom to authenticate users. However, if a startup goes out of business and its domain is subsequently purchased by an attacker, the new domain owner can recreate email accounts belonging to former employees and gain entry into various SaaS platforms. This breach can lead to exposure of highly sensitive information such as Social Security numbers, tax documents, and private messages.

The problem is further compounded by the high failure rate of tech startups, many of which use Google Workspace for their email services. When these companies shut down, their domains become prime targets for exploitation. Using data from Crunchbase, a security researcher estimated that upwards of 100,000 defunct domains are vulnerable, potentially impacting more than 10 million user accounts. This statistical risk underscores the urgency of addressing the flaw to prevent widespread data breaches.

The Inconsistency of the Sub Claim

Google’s OAuth system includes a unique user identifier known as the sub claim, designed to prevent the issue of unauthorized access. However, the sub claim’s inconsistent application renders it ineffective as a verification tool. Many platforms rely solely on email and domain claims for authentication. Since these claims remain valid regardless of ownership changes, this allows attackers to gain unauthorized access merely by controlling the domain.

The deficiency in reliable verification necessitates a more robust solution. The security researcher proposed an implementation of two immutable identifiers within Google’s OpenID Connect (OIDC) claims. One should be a unique user ID that remains consistent over time, and the other a unique workspace ID tied to the domain. This approach ensures that user authentication remains secure even if domain ownership changes. Google’s initial response dismissed the report as a non-OAuth vulnerability, but their stance shifted following the researcher’s presentation at ShmooCon. Acknowledging the issue, Google awarded a bounty and pledged to devise a fix. However, specific details and timelines for the solution remain undisclosed.

Potential Solutions and Recommendations

Steps for Third-Party Service Providers

Currently, third-party service providers face significant hurdles in mitigating this vulnerability without Google’s active intervention. One immediate recommendation for users is to exercise caution when using “Sign in with Google” for critical services. Encouraging startups to adopt more secure single sign-on (SSO) solutions strengthened by two-factor authentication (2FA) remains essential. These measures can provide an additional layer of security and restrict unauthorized access.

Service providers can also introduce additional verification steps to bolster security. For example, integrating SMS code verification or requiring credit card validation during password resets can mitigate the potential risks. Such enhanced verification procedures would make it considerably more challenging for malicious actors to exploit dormant domains, thus protecting sensitive user data.

Google’s Role and the Path Forward

In a startling revelation that has rocked the tech community, a significant flaw has been discovered in Google’s widely-used “Sign in with Google” OAuth authentication system. This vulnerability has the potential to expose millions of user accounts to data theft, posing severe risks, especially for individuals who were once associated with now-defunct startups. The issue arises from the way Google’s OAuth handles domain ownership, allowing malicious actors to exploit abandoned domains. These cybercriminals can then gain unauthorized access to user accounts, putting sensitive personal and professional data at risk. This flaw highlights the need for robust security measures and constant vigilance in managing domain ownership and authentication processes. As the tech industry grapples with this discovery, it underscores the critical importance of securing digital identities and the systems designed to protect them. The response from Google and other tech giants will be closely monitored as they work to mitigate the risks and strengthen their authentication frameworks.

Explore more

AI and Generative AI Transform Global Corporate Banking

The high-stakes world of global corporate finance has finally severed its ties to the sluggish, paper-heavy traditions of the past, replacing the clatter of manual data entry with the silent, lightning-fast processing of neural networks. While the industry once viewed artificial intelligence as a speculative luxury confined to the periphery of experimental “innovation labs,” it has now matured into the

Is Auditability the New Standard for Agentic AI in Finance?

The days when a financial analyst could be mesmerized by a chatbot simply generating a coherent market summary have vanished, replaced by a rigorous demand for structural transparency. As financial institutions pivot from experimental generative models to autonomous agents capable of managing liquidity and executing trades, the “wow factor” has been eclipsed by the cold reality of production-grade requirements. In

How to Bridge the Execution Gap in Customer Experience

The modern enterprise often functions like a sophisticated supercomputer that possesses every piece of relevant information about a customer yet remains fundamentally incapable of addressing a simple inquiry without requiring the individual to repeat their identity multiple times across different departments. This jarring reality highlights a systemic failure known as the execution gap—a void where multi-million dollar investments in marketing

Trend Analysis: AI Driven DevSecOps Orchestration

The velocity of software production has reached a point where human intervention is no longer the primary driver of development, but rather the most significant bottleneck in the security lifecycle. As generative tools produce massive volumes of functional code in seconds, the traditional manual review process has effectively crumbled under the weight of machine-generated output. This shift has created a

Navigating Kubernetes Complexity With FinOps and DevOps Culture

The rapid transition from static virtual machine environments to the fluid, containerized architecture of Kubernetes has effectively rewritten the rules of modern infrastructure management. While this shift has empowered engineering teams to deploy at an unprecedented velocity, it has simultaneously introduced a layer of financial complexity that traditional billing models are ill-equipped to handle. As organizations navigate the current landscape,