Critical Flaw in Google’s OAuth Risks Data of Millions From Defunct Startups

In a striking revelation that has sent shockwaves through the tech industry, a critical flaw in Google’s widely-utilized “Sign in with Google” OAuth authentication system has been identified. This vulnerability potentially exposes millions of user accounts to data theft, posing significant risks, particularly to individuals who previously worked for now-defunct startups. The flaw stems from the manner in which Google’s OAuth interacts with domain ownership, enabling malicious actors to exploit abandoned domains and gain unauthorized access to user accounts.

Vulnerability in the OAuth System

Exploiting Abandoned Domains

When users sign in using Google’s OAuth, Google sends third-party services a set of claims, including the user’s email address and a domain-specific identifier (hd claim). These claims are then used by services like Slack, Notion, and Zoom to authenticate users. However, if a startup goes out of business and its domain is subsequently purchased by an attacker, the new domain owner can recreate email accounts belonging to former employees and gain entry into various SaaS platforms. This breach can lead to exposure of highly sensitive information such as Social Security numbers, tax documents, and private messages.

The problem is further compounded by the high failure rate of tech startups, many of which use Google Workspace for their email services. When these companies shut down, their domains become prime targets for exploitation. Using data from Crunchbase, a security researcher estimated that upwards of 100,000 defunct domains are vulnerable, potentially impacting more than 10 million user accounts. This statistical risk underscores the urgency of addressing the flaw to prevent widespread data breaches.

The Inconsistency of the Sub Claim

Google’s OAuth system includes a unique user identifier known as the sub claim, designed to prevent the issue of unauthorized access. However, the sub claim’s inconsistent application renders it ineffective as a verification tool. Many platforms rely solely on email and domain claims for authentication. Since these claims remain valid regardless of ownership changes, this allows attackers to gain unauthorized access merely by controlling the domain.

The deficiency in reliable verification necessitates a more robust solution. The security researcher proposed an implementation of two immutable identifiers within Google’s OpenID Connect (OIDC) claims. One should be a unique user ID that remains consistent over time, and the other a unique workspace ID tied to the domain. This approach ensures that user authentication remains secure even if domain ownership changes. Google’s initial response dismissed the report as a non-OAuth vulnerability, but their stance shifted following the researcher’s presentation at ShmooCon. Acknowledging the issue, Google awarded a bounty and pledged to devise a fix. However, specific details and timelines for the solution remain undisclosed.

Potential Solutions and Recommendations

Steps for Third-Party Service Providers

Currently, third-party service providers face significant hurdles in mitigating this vulnerability without Google’s active intervention. One immediate recommendation for users is to exercise caution when using “Sign in with Google” for critical services. Encouraging startups to adopt more secure single sign-on (SSO) solutions strengthened by two-factor authentication (2FA) remains essential. These measures can provide an additional layer of security and restrict unauthorized access.

Service providers can also introduce additional verification steps to bolster security. For example, integrating SMS code verification or requiring credit card validation during password resets can mitigate the potential risks. Such enhanced verification procedures would make it considerably more challenging for malicious actors to exploit dormant domains, thus protecting sensitive user data.

Google’s Role and the Path Forward

In a startling revelation that has rocked the tech community, a significant flaw has been discovered in Google’s widely-used “Sign in with Google” OAuth authentication system. This vulnerability has the potential to expose millions of user accounts to data theft, posing severe risks, especially for individuals who were once associated with now-defunct startups. The issue arises from the way Google’s OAuth handles domain ownership, allowing malicious actors to exploit abandoned domains. These cybercriminals can then gain unauthorized access to user accounts, putting sensitive personal and professional data at risk. This flaw highlights the need for robust security measures and constant vigilance in managing domain ownership and authentication processes. As the tech industry grapples with this discovery, it underscores the critical importance of securing digital identities and the systems designed to protect them. The response from Google and other tech giants will be closely monitored as they work to mitigate the risks and strengthen their authentication frameworks.

Explore more

Trend Analysis: Career Adaptation in AI Era

The long-standing illusion that a stable career is built solely upon years of dedicated service to a single institution is rapidly evaporating under the heat of technological disruption. Historically, professionals viewed consistency and institutional knowledge as the ultimate safeguards against the volatility of the economy. However, as Artificial Intelligence integrates into the core of global operations, these traditional virtues are

Trend Analysis: Modern Workplace Productivity Paradox

The seamless integration of sophisticated intelligence into every digital interface has created a landscape where the output of a novice often looks indistinguishable from that of a veteran. While automation and generative tools promised to liberate the human spirit from the drudgery of repetitive tasks, the reality on the ground suggests a far more taxing environment. Today, the average professional

How Data Analytics and AI Shape Modern Business Strategy

The shift from traditional intuition-based management to a framework defined by empirical evidence has fundamentally altered how global enterprises identify opportunities and mitigate risks in a volatile economy. This evolution is driven by data analytics, a discipline that has transitioned from a supporting back-office function to the primary engine of corporate strategy and operational excellence. Organizations now navigate increasingly complex

Trend Analysis: Robust Statistics in Data Science

The pristine, bell-curved datasets found in academic textbooks rarely survive a first encounter with the chaotic realities of industrial data streams. In the current landscape of 2026, the reliance on idealized assumptions has proven to be a liability rather than a foundation. Real-world data is notoriously messy, characterized by extreme outliers, heavily skewed distributions, and inconsistent variances that render traditional

Trend Analysis: B2B Decision Environments

The rigid, mechanical architecture of the traditional sales funnel has finally buckled under the weight of a modern buyer who demands total autonomy throughout the purchasing process. Marketing departments that once relied on pushing leads through a linear pipeline now face a reality where the buyer is the one in control, often lurking in the shadows of self-education long before