Google OAuth Flaw Risks Millions by Exploiting Failed Startup Domains

A substantial security flaw has been discovered in Google’s “Sign in with Google” authentication process, raising significant concerns about users’ data privacy. Dylan Ayrey, CEO of Truffle Security, unveiled the vulnerability, which exploits a loophole in domain ownership and poses a threat to millions of users’ sensitive data. This flaw allows unauthorized access through defunct domains once owned by startups that have since failed. The essence of this exploit lies in acquiring these expired domains and recreating email accounts for former employees, giving attackers access to various SaaS products that the organization used, including vital applications such as OpenAI ChatGPT, Slack, Notion, and Zoom. Sensitive information from HR systems, including tax documents, pay stubs, insurance details, and social security numbers, can also be compromised.

OAuth stands for open authorization and serves as a framework that enables users to grant websites or applications access to their personal information without sharing passwords. Instead, an access token is used. When users opt to “Sign in with Google,” Google provides the service with their email address and hosted domain to validate their identity. However, this process comes under threat when domain ownership changes hands, as attackers can manipulate this transition to access old employee accounts. Google’s OAuth ID token includes a unique user identifier known as the sub claim, which theoretically was meant to prevent such issues. Unfortunately, this method has proven unreliable in certain cases, leading to vulnerabilities. Comparing this to Microsoft’s Entra ID tokens, which include sub or oid claims to store an immutable value per user, Google’s approach seems less secure.

Exploiting the Domain Ownership Loophole

The primary concern arises when attackers purchase domains previously owned by failed startups, enabling them to recreate email accounts of former employees and subsequently access numerous SaaS products that the organization once utilized. This unauthorized access is not limited to internal messaging platforms but also extends to sensitive areas within HR systems, potentially exposing personal information such as tax documents and social security numbers. This loophole exploits the fundamental trust in the OAuth system, leveraging the seemingly benign process of re-authenticating a domain as an opportunity to bypass restrictions and infiltrate user accounts.

The significance of this threat is accentuated by the widespread use of Google’s OAuth authentication mechanism across various platforms. The repercussions of such unauthorized access are vast, potentially affecting millions of users who rely on “Sign in with Google” for a seamless and secure login experience. The implications extend to the very core of users’ digital interactions, emphasizing the need for a more robust and secure method for managing domain ownership transitions. Despite Google’s initial stance that this was intended behavior, the reopening of the bug report and the subsequent bounty awarded to Ayrey underscore the criticality of addressing this vulnerability.

Addressing the Flaw: Recommendations and Best Practices

In light of this discovery, Google has recognized the problem and categorized it as an “abuse-related methodology with high impact.” In response, Google has recommended best security practices to mitigate the risk, including wiping out user data when an account is closed and utilizing the sub field as the unique identifier key within applications. This approach, though a step in the right direction, highlights the importance of immutable identifiers in ensuring the security of user accounts, particularly during domain ownership changes. The consensus within the cybersecurity community underscores the necessity of adopting stringent data protection measures, especially when managing domain closures.

The need for robust security protocols is further emphasized by the importance of ensuring the use of immutable identifiers for users. This practice is championed by Google for third-party applications, as it helps mitigate risks associated with domain ownership changes. Proper closure of domains and the use of unique account identifiers are crucial steps in protecting against such vulnerabilities. This revelation serves as a poignant reminder of the potential risks to millions of users and underscores the need for heightened vigilance in data protection.

Moving Forward: Enhancing Data Security

A major security flaw has been identified in Google’s “Sign in with Google” authentication method, raising serious concerns about user data privacy. Dylan Ayrey, CEO of Truffle Security, revealed the weakness, exploiting a loophole in domain ownership, potentially threatening the sensitive data of millions of users. The flaw enables unauthorized access through expired domains formerly owned by now-defunct startups. By acquiring these expired domains and recreating email accounts of former employees, attackers gain access to various SaaS products used by the organizations, including key applications like OpenAI ChatGPT, Slack, Notion, and Zoom. Sensitive information from HR systems, such as tax documents, pay stubs, insurance details, and social security numbers, is also at risk.

OAuth, short for open authorization, allows users to grant websites or applications access to their information without sharing passwords, using an access token instead. When users opt to “Sign in with Google,” Google authenticates their identity via their email address and hosted domain. However, the process faces security issues when domain ownership shifts, allowing attackers to exploit the transition and access previous employee accounts. Google’s OAuth ID token includes a unique user identifier known as the sub claim, which was intended to prevent these problems but has proven unreliable. In comparison, Microsoft’s Entra ID tokens use sub or oid claims to store an immutable value for each user, making Google’s approach appear less secure.

Explore more

Can AI Redefine C-Suite Leadership with Digital Avatars?

I’m thrilled to sit down with Ling-Yi Tsai, a renowned HRTech expert with decades of experience in leveraging technology to drive organizational change. Ling-Yi specializes in HR analytics and the integration of cutting-edge tools across recruitment, onboarding, and talent management. Today, we’re diving into a groundbreaking development in the AI space: the creation of an AI avatar of a CEO,

Cash App Pools Feature – Review

Imagine planning a group vacation with friends, only to face the hassle of tracking who paid for what, chasing down contributions, and dealing with multiple payment apps. This common frustration in managing shared expenses highlights a growing need for seamless, inclusive financial tools in today’s digital landscape. Cash App, a prominent player in the peer-to-peer payment space, has introduced its

Scowtt AI Customer Acquisition – Review

In an era where businesses grapple with the challenge of turning vast amounts of data into actionable revenue, the role of AI in customer acquisition has never been more critical. Imagine a platform that not only deciphers complex first-party data but also transforms it into predictable conversions with minimal human intervention. Scowtt, an AI-native customer acquisition tool, emerges as a

Hightouch Secures Funding to Revolutionize AI Marketing

Imagine a world where every marketing campaign speaks directly to an individual customer, adapting in real time to their preferences, behaviors, and needs, with outcomes so precise that engagement rates soar beyond traditional benchmarks. This is no longer a distant dream but a tangible reality being shaped by advancements in AI-driven marketing technology. Hightouch, a trailblazer in data and AI

How Does Collibra’s Acquisition Boost Data Governance?

In an era where data underpins every strategic decision, enterprises grapple with a staggering reality: nearly 90% of their data remains unstructured, locked away as untapped potential in emails, videos, and documents, often dubbed “dark data.” This vast reservoir holds critical insights that could redefine competitive edges, yet its complexity has long hindered effective governance, making Collibra’s recent acquisition of