Critical Flaw in Google’s OAuth Risks Data of Millions From Defunct Startups

In a striking revelation that has sent shockwaves through the tech industry, a critical flaw in Google’s widely-utilized “Sign in with Google” OAuth authentication system has been identified. This vulnerability potentially exposes millions of user accounts to data theft, posing significant risks, particularly to individuals who previously worked for now-defunct startups. The flaw stems from the manner in which Google’s OAuth interacts with domain ownership, enabling malicious actors to exploit abandoned domains and gain unauthorized access to user accounts.

Vulnerability in the OAuth System

Exploiting Abandoned Domains

When users sign in using Google’s OAuth, Google sends third-party services a set of claims, including the user’s email address and a domain-specific identifier (hd claim). These claims are then used by services like Slack, Notion, and Zoom to authenticate users. However, if a startup goes out of business and its domain is subsequently purchased by an attacker, the new domain owner can recreate email accounts belonging to former employees and gain entry into various SaaS platforms. This breach can lead to exposure of highly sensitive information such as Social Security numbers, tax documents, and private messages.

The problem is further compounded by the high failure rate of tech startups, many of which use Google Workspace for their email services. When these companies shut down, their domains become prime targets for exploitation. Using data from Crunchbase, a security researcher estimated that upwards of 100,000 defunct domains are vulnerable, potentially impacting more than 10 million user accounts. This statistical risk underscores the urgency of addressing the flaw to prevent widespread data breaches.

The Inconsistency of the Sub Claim

Google’s OAuth system includes a unique user identifier known as the sub claim, designed to prevent the issue of unauthorized access. However, the sub claim’s inconsistent application renders it ineffective as a verification tool. Many platforms rely solely on email and domain claims for authentication. Since these claims remain valid regardless of ownership changes, this allows attackers to gain unauthorized access merely by controlling the domain.

The deficiency in reliable verification necessitates a more robust solution. The security researcher proposed an implementation of two immutable identifiers within Google’s OpenID Connect (OIDC) claims. One should be a unique user ID that remains consistent over time, and the other a unique workspace ID tied to the domain. This approach ensures that user authentication remains secure even if domain ownership changes. Google’s initial response dismissed the report as a non-OAuth vulnerability, but their stance shifted following the researcher’s presentation at ShmooCon. Acknowledging the issue, Google awarded a bounty and pledged to devise a fix. However, specific details and timelines for the solution remain undisclosed.

Potential Solutions and Recommendations

Steps for Third-Party Service Providers

Currently, third-party service providers face significant hurdles in mitigating this vulnerability without Google’s active intervention. One immediate recommendation for users is to exercise caution when using “Sign in with Google” for critical services. Encouraging startups to adopt more secure single sign-on (SSO) solutions strengthened by two-factor authentication (2FA) remains essential. These measures can provide an additional layer of security and restrict unauthorized access.

Service providers can also introduce additional verification steps to bolster security. For example, integrating SMS code verification or requiring credit card validation during password resets can mitigate the potential risks. Such enhanced verification procedures would make it considerably more challenging for malicious actors to exploit dormant domains, thus protecting sensitive user data.

Google’s Role and the Path Forward

In a startling revelation that has rocked the tech community, a significant flaw has been discovered in Google’s widely-used “Sign in with Google” OAuth authentication system. This vulnerability has the potential to expose millions of user accounts to data theft, posing severe risks, especially for individuals who were once associated with now-defunct startups. The issue arises from the way Google’s OAuth handles domain ownership, allowing malicious actors to exploit abandoned domains. These cybercriminals can then gain unauthorized access to user accounts, putting sensitive personal and professional data at risk. This flaw highlights the need for robust security measures and constant vigilance in managing domain ownership and authentication processes. As the tech industry grapples with this discovery, it underscores the critical importance of securing digital identities and the systems designed to protect them. The response from Google and other tech giants will be closely monitored as they work to mitigate the risks and strengthen their authentication frameworks.

Explore more

Why Are Small Businesses Losing Confidence in Marketing?

In the ever-evolving landscape of commerce, small and mid-sized businesses (SMBs) globally are grappling with a perplexing challenge: despite pouring more time, energy, and resources into marketing, their confidence in achieving impactful results is waning, and recent findings reveal a stark reality where only a fraction of these businesses feel assured about their strategies. Many struggle to measure success or

How Are AI Agents Revolutionizing Chatbot Marketing?

In an era where digital interaction shapes customer expectations, Artificial Intelligence (AI) is fundamentally altering the landscape of chatbot marketing with unprecedented advancements. Once limited to answering basic queries through rigid scripts, chatbots have evolved into sophisticated AI agents capable of managing intricate workflows and delivering seamless engagement. Innovations like Silverback AI Chatbot’s updated framework exemplify this transformation, pushing the

How Does Klaviyo Lead AI-Driven B2C Marketing in 2025?

In today’s rapidly shifting landscape of business-to-consumer (B2C) marketing, artificial intelligence (AI) has emerged as a pivotal force, reshaping how brands forge connections with their audiences. At the forefront of this transformation stands Klaviyo, a marketing platform that has solidified its reputation as an industry pioneer. By harnessing sophisticated AI technologies, Klaviyo enables companies to craft highly personalized customer experiences,

How Does Azure’s Trusted Launch Upgrade Enhance Security?

In an era where cyber threats are becoming increasingly sophisticated, businesses running workloads in the cloud face constant challenges in safeguarding their virtual environments from advanced attacks like bootkits and firmware exploits. A significant step forward in addressing these concerns has emerged with a recent update from Microsoft, introducing in-place upgrades for a key security feature on Azure Virtual Machines

How Does Digi Power X Lead with ARMS 200 AI Data Centers?

In an era where artificial intelligence is reshaping industries at an unprecedented pace, the demand for robust, reliable, and scalable data center infrastructure has never been higher, and Digi Power X is stepping up to meet this challenge head-on with innovative solutions. This NASDAQ-listed energy infrastructure company, under the ticker DGXX, recently made headlines with a groundbreaking achievement through its