Google OAuth Flaw Risks Millions by Exploiting Failed Startup Domains

A substantial security flaw has been discovered in Google’s “Sign in with Google” authentication process, raising significant concerns about users’ data privacy. Dylan Ayrey, CEO of Truffle Security, unveiled the vulnerability, which exploits a loophole in domain ownership and poses a threat to millions of users’ sensitive data. This flaw allows unauthorized access through defunct domains once owned by startups that have since failed. The essence of this exploit lies in acquiring these expired domains and recreating email accounts for former employees, giving attackers access to various SaaS products that the organization used, including vital applications such as OpenAI ChatGPT, Slack, Notion, and Zoom. Sensitive information from HR systems, including tax documents, pay stubs, insurance details, and social security numbers, can also be compromised.

OAuth stands for open authorization and serves as a framework that enables users to grant websites or applications access to their personal information without sharing passwords. Instead, an access token is used. When users opt to “Sign in with Google,” Google provides the service with their email address and hosted domain to validate their identity. However, this process comes under threat when domain ownership changes hands, as attackers can manipulate this transition to access old employee accounts. Google’s OAuth ID token includes a unique user identifier known as the sub claim, which theoretically was meant to prevent such issues. Unfortunately, this method has proven unreliable in certain cases, leading to vulnerabilities. Comparing this to Microsoft’s Entra ID tokens, which include sub or oid claims to store an immutable value per user, Google’s approach seems less secure.

Exploiting the Domain Ownership Loophole

The primary concern arises when attackers purchase domains previously owned by failed startups, enabling them to recreate email accounts of former employees and subsequently access numerous SaaS products that the organization once utilized. This unauthorized access is not limited to internal messaging platforms but also extends to sensitive areas within HR systems, potentially exposing personal information such as tax documents and social security numbers. This loophole exploits the fundamental trust in the OAuth system, leveraging the seemingly benign process of re-authenticating a domain as an opportunity to bypass restrictions and infiltrate user accounts.

The significance of this threat is accentuated by the widespread use of Google’s OAuth authentication mechanism across various platforms. The repercussions of such unauthorized access are vast, potentially affecting millions of users who rely on “Sign in with Google” for a seamless and secure login experience. The implications extend to the very core of users’ digital interactions, emphasizing the need for a more robust and secure method for managing domain ownership transitions. Despite Google’s initial stance that this was intended behavior, the reopening of the bug report and the subsequent bounty awarded to Ayrey underscore the criticality of addressing this vulnerability.

Addressing the Flaw: Recommendations and Best Practices

In light of this discovery, Google has recognized the problem and categorized it as an “abuse-related methodology with high impact.” In response, Google has recommended best security practices to mitigate the risk, including wiping out user data when an account is closed and utilizing the sub field as the unique identifier key within applications. This approach, though a step in the right direction, highlights the importance of immutable identifiers in ensuring the security of user accounts, particularly during domain ownership changes. The consensus within the cybersecurity community underscores the necessity of adopting stringent data protection measures, especially when managing domain closures.

The need for robust security protocols is further emphasized by the importance of ensuring the use of immutable identifiers for users. This practice is championed by Google for third-party applications, as it helps mitigate risks associated with domain ownership changes. Proper closure of domains and the use of unique account identifiers are crucial steps in protecting against such vulnerabilities. This revelation serves as a poignant reminder of the potential risks to millions of users and underscores the need for heightened vigilance in data protection.

Moving Forward: Enhancing Data Security

A major security flaw has been identified in Google’s “Sign in with Google” authentication method, raising serious concerns about user data privacy. Dylan Ayrey, CEO of Truffle Security, revealed the weakness, exploiting a loophole in domain ownership, potentially threatening the sensitive data of millions of users. The flaw enables unauthorized access through expired domains formerly owned by now-defunct startups. By acquiring these expired domains and recreating email accounts of former employees, attackers gain access to various SaaS products used by the organizations, including key applications like OpenAI ChatGPT, Slack, Notion, and Zoom. Sensitive information from HR systems, such as tax documents, pay stubs, insurance details, and social security numbers, is also at risk.

OAuth, short for open authorization, allows users to grant websites or applications access to their information without sharing passwords, using an access token instead. When users opt to “Sign in with Google,” Google authenticates their identity via their email address and hosted domain. However, the process faces security issues when domain ownership shifts, allowing attackers to exploit the transition and access previous employee accounts. Google’s OAuth ID token includes a unique user identifier known as the sub claim, which was intended to prevent these problems but has proven unreliable. In comparison, Microsoft’s Entra ID tokens use sub or oid claims to store an immutable value for each user, making Google’s approach appear less secure.

Explore more

POCO F7: India’s Largest Battery and Flagship Features Unveiled

The competition to bring unparalleled battery life to smartphones has intensified as advances continue to redefine what consumers expect. The POCO F7, with its promise of housing India’s largest battery, could be a game-changer, challenging the status quo as users look for devices that offer both power and efficiency. Explaining the Smartphone Revolution The rise of the POCO F7 comes

Smartphone Cameras vs. DSLR Cameras: A Comparative Analysis

With the rapid advancements in mobile technology, smartphone cameras have emerged as formidable contenders to the traditionally dominant DSLR cameras. This comparison delves into the innovative strides made by smartphone models, such as the Samsung Galaxy S25 Ultra, Xiaomi 15 Ultra, and Google Pixel 9 Pro, all showcasing professional-grade capabilities challenging the DSLR stronghold in the photography realm. To understand

Will Endpoint Security Revolutionize Digital Defense?

The digital defense landscape is experiencing a transformative shift as endpoint security emerges as a central player in thwarting cyber threats. With the rise in remote work and mobile device usage, companies are under increasing pressure to protect their endpoint devices from security breaches. Forecasts suggest impressive growth, with the market projected to expand at a compound annual growth rate

Trend Analysis: Buy Now Pay Later Adoption

In an era where economic pressures weigh heavily on consumers, the appeal of Buy Now, Pay Later (BNPL) schemes grows stronger. This financial innovation offers immediate purchasing power without the immediate pinch of payment, attracting a large swath of consumers, particularly younger adults grappling with inflation-induced stresses. The reality is stark: as costs continue to rise, consumers eagerly turn to

XRP’s Path to Capturing Cross-Border Liquidity Markets

The world of digital currency has often been a realm of speculation, yet amidst the unpredictable motion of market trends, XRP emerges as a topic of sustained interest. While it has struggled to break beyond its historical peak of $3, analysts continue to view XRP with optimism due to its intrinsic value in enhancing international payment ecosystems. Unlike many other