Tuesday, 2 December 2025
25 C
Singapore
32.2 C
Thailand
27.9 C
Indonesia
28 C
Philippines

Employees of failed startups risk data theft through Google logins

Former employees of failed startups face risks of data theft due to a Google login flaw. Learn about the issue and how to protect yourself.

Losing your job at a failed startup is hard enough, but now there’s a growing concern about a hidden threat: the potential for your personal data to be stolen. This includes sensitive details like private messages, Social Security numbers, and bank account information.

A discovery with alarming implications

Security researcher Dylan Ayrey, co-founder and CEO of Truffle Security, uncovered this vulnerability. Ayrey is recognised for creating TruffleHog, an open-source project that monitors data leaks involving API keys, passwords, and tokens. After notifying Google and the affected companies, his findings were presented at the ShmooCon security conference.

The vulnerability lies in how Google OAuth, used for “Sign in with Google,” handles domain-level access. If cybercriminals purchase failed startups’ expired domains, they could log in to cloud-based software linked to those domains. These apps, ranging from Slack to HR systems, often hold critical employee data.

Ayrey tested his theory by acquiring the domain of a defunct startup. Using it, he gained access to applications such as ChatGPT, Zoom, and an HR platform that contained Social Security numbers. He noted that the biggest threat is the monetisable data stored in HR systems, such as banking information.

Thankfully, Google confirmed that data stored in personal Gmail accounts or Google Docs is not at risk. However, startups are particularly vulnerable because they often rely heavily on Google’s tools and cloud-based services. Ayrey estimates that tens of thousands of former employees and millions of accounts could be affected, given the 116,000 startup domains currently available for sale.

Limited solutions to a significant problem

Google’s OAuth configuration includes a feature called a “sub-identifier,” which uniquely identifies each Google account. This mechanism should, in theory, prevent unauthorised access, even if hackers recreate email addresses.

However, Ayrey found issues with this system. Collaborating with an affected HR provider, he discovered that sub-identifiers occasionally changed, albeit in a tiny percentage of cases (0.04%). This inconsistency could lock out hundreds of users weekly for large platforms, leading some providers to forgo the feature.

Google disputes these findings, claiming that sub-identifiers do not change. However, as the HR provider reported the issue and not directly through Ayrey’s bug report, it remains unresolved.

Google’s response

Initially, Google dismissed Ayrey’s findings, calling the issue a “fraud” risk rather than a bug. Ayrey acknowledged this perspective, noting that Google’s OAuth system worked as designed, but the vulnerability highlighted broader data privacy concerns.

Three months later, Google reconsidered and awarded Ayrey a US$1,337 bounty for his discovery. This wasn’t the first time his findings were reconsidered—he faced a similar situation in 2021 when a talk at Black Hat prompted Google to acknowledge his work and award him third prize in their annual security research competition.

Despite recognising the issue, Google has not released a technical fix. The company has updated its guidance, encouraging cloud providers to use sub-identifiers, but has not announced further plans.

You may be at risk if you’ve worked at a failed startup. Ayrey advises employees to secure their accounts by updating passwords and unlinking old “Sign in with Google” connections from inactive domains. Being proactive can help mitigate these risks as the tech world waits for broader fixes.

Hot this week

DeepSeek launches open AI model achieving gold-level scores at the Maths Olympiad

DeepSeek launches Math-V2, the first open AI model to achieve gold-level scores at the International Mathematical Olympiad.

AI browsers vulnerable to covert hacks using simple URL fragments, experts warn

Experts warn AI browsers can be hacked with hidden URL fragments, posing risks invisible to traditional security measures.

Call of Duty: Black Ops 7 prepares major content surge with Season 1 launch

Black Ops 7 prepares for a major revival as Season 1 delivers a huge wave of new maps, modes, weapons and Zombies content on 4 December.

Marsham Edge: Converting AI hype into measurable performance gains for megaprojects

Marsham Edge CEO Muriel Demarcus explains how AI can transform megaprojects into data-driven infrastructure that delivers on time and on budget.

Kaspersky warns of AI-generated sites distributing remote access software in global campaign

Kaspersky reports a global campaign using AI-generated websites to distribute remote access tools and gain control of victims’ devices.

Honor showcases early low-light camera performance of the Magic 8 Pro

Honor offers an early look at the Magic 8 Pro’s upgraded low-light camera performance during brief testing at the Singapore Oceanarium.

Porsche unveils new electric-only Cayenne with up to 1,140hp and wireless charging

Porsche launches the new electric-only Cayenne with up to 1,140hp, ultra-fast charging, wireless charging, and improved practicality.

Team Cherry confirms more Silksong content without a release date

Team Cherry is working on new Hollow Knight: Silksong content, but no release date has been announced.

Ayaneo unveils the Next II, a powerful handheld with a 9-inch display

Ayaneo reveals the Next II handheld with a 9-inch OLED display, a Ryzen AI Max+ chip, and advanced controls, aimed at high-end gamers.

Related Articles

Popular Categories