Crooks Bypassed Google's Email Verification to Create Workspace Accounts, Acces
Google fixed a security flaw that let criminals bypass email verification for Google Workspace accounts, enabling impersonation of domain holders. The issue was resolved within 72 hours, with new safeguards implemented.
Read original articleGoogle recently addressed a security flaw that allowed criminals to bypass email verification when creating Google Workspace accounts. This vulnerability enabled them to impersonate domain holders and access third-party services that utilize Google’s "Sign in with Google" feature. Reports indicated that a small-scale abuse campaign began in late June, resulting in the creation of several thousand Workspace accounts without proper domain verification. Google stated that the issue was resolved within 72 hours of detection and that additional safeguards have been implemented to prevent similar authentication bypasses in the future.
The method employed by the attackers involved using one email address to sign in while verifying a token with a different email address. Although no Google services were directly abused, the attackers aimed to impersonate legitimate domain holders to gain access to other online services. One victim reported that their domain was linked to a Workspace account, which was subsequently used to sign into their Dropbox account.
Google clarified that this incident is unrelated to a recent issue involving the hijacking of cryptocurrency-related domains during their transition to Squarespace. The company emphasized that the flaw allowed unauthorized account creation but did not compromise existing Workspace accounts or services.
Related
Blog.ethereum.org Mailing List Incident
A phishing email targeted 35,794 Ethereum blog subscribers, attempting to drain wallets through a malicious link. Security measures were promptly taken, no funds were lost, and further precautions are underway.
Google Gemini scans files on Google Drive without permission – can't be disabled
Google's Gemini AI scans Google Drive PDFs without consent, sparking privacy concerns. Users struggle to disable scanning, possibly linked to Google Workspace Labs. Lack of control raises privacy and data security issues.
Google's Gemini AI caught scanning Google Drive PDF files without permission
Google's Gemini AI scans Google Drive PDFs without consent, sparking privacy concerns. Users struggle to disable this feature, raising questions about user control and data privacy within AI services.
Gemini AI caught scanning Google Drive hosted PDF files without permission
Google's Gemini AI scans PDFs on Google Drive without consent, raising privacy concerns. Users struggle to disable the feature, possibly linked to Google Workspace Labs settings. Lack of transparency emphasizes privacy risks.
Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks
Researchers found Squarespace's weak security defaults allowed hackers to hijack domains, targeting cryptocurrency businesses. Migration from Google Domains left accounts vulnerable, leading to phishing attacks. Squarespace improved security measures post-incident.
- Many users experienced unauthorized account creation attempts using their domains, leading to potential impersonation risks.
- There is frustration over Google's security measures, with users questioning the lack of verification processes for custom domains.
- Several commenters shared personal experiences of being targeted by scammers exploiting the vulnerability.
- Concerns were raised about the reliability of social login systems and the risks associated with using major tech companies as identity providers.
- Users expressed dissatisfaction with Google's support and recovery processes when locked out of their accounts.
I don't have Google workspace for this domain and use an alternate email provider. I was curious so tried to signin and was told that the admin account was an email on my domain (eg foo@mydomain.com). Ok, created that account so I could receive email, except then Google said that I had to use the backup recovery email which happened to be mydomain@gmail.com.
Google said that non verified workspaces (eg not verified through txt or cname records) would be automatically deleted after 7 days.
14 days later the workspace was still there.
I had to go through a convoluted manual form and process to get my workspace domain back and then properly register it so this would not happen again.
I provided the following feedback which seems like common sense, but I guess it ain't that common:
1) you shouldn't be able to create a workspace with a custom domain without verifying it via DNS records from the start. No 7 day grace which actually was broken and for all I know was infinite grace period.
2) the established admin account with a custom domain email address should be eligible to perform recovery. Not some arbitrary secondary Gmail account.
Anyway the incident shook me as they also gave me my personal information to prove they are real and it was accurate and kept saying look we aren’t asking you for information we are telling you yours so you see we are Google Security!
It has triggered for me a giant project to carefully review all my attack surfaces across all accounts and systems.
Someone can register example.com with google workspace and then they can use "login with google" to log in to your bigboss@example.com account at greatonlinegame.com, even though your account did not use "login with google".
Did i get it right?
And if i did, i wonder...
Why aren't these logins separate on greatonlinegame.com? If I did it i'd allow a login only by the method that was used to create the account, unless the user configures it otherwise.
That means that, even if you don't want anything to do with Google at all, others could have impersonated you by registering a Google Workspace trial account on your email address, "verifying" their account through this vulnerability, and logging in to third-party sites (that support Google login) by using your email address.
Is there a best practice around confirming adding social login to a pre-existing account? (Like entering current password or email confirmation?)
From the article:
> In the case of the reader who shared the breach notice from Google, the imposters used the authentication bypass to associate his domain with a Workspace account. And that domain was tied to his login at several third-party services online. Indeed, the alert this reader received from Google said the unauthorized Workspace account appears to have been used to sign in to his account at Dropbox
Fun fact, Google doesn't allow you to contact support if you are locked out. It also doesn't allow you to post for help on their community forums.
I guess Google gets to decide if I am allowed to use email. My employer apparently doesn't get a say in the matter.
I was able to login to Gmail with myname@hotmail.com and send emails. Emails were however being received only on the outlook.com account. Blew my mind.
There doesn't appear to be a way to tell Google, "I own this domain, just block all of these bogus requests" other than signing up for the services in question (which I don't want to do!)
Scammers will be scammers, but this is also pretty shitty behavior on Google's part.
Is this like the PayPal XSRF vulnerability where any issued XSRF token was considered valid regardless of the user trying to use it?
I’d expect Google to have some standard way to handle this stuff.
I used to use these “social logins” exclusively. Whether they were FB, Apple, or Google. Because big tech couldn’t get hacked and it was convenient.
But quickly realized how much of a pain it was to deal with when issues at various service providers arose. It complicated operations for small businesses. Often I lost accounts because their support just gave up on trying to diagnose issue.
But also if those IdPs deemed your account in violation of some vague policy, or maybe they just don’t like you because of “freeloading”. Then you will quickly lose out on access to numerous services.
Some services have sane account management practices and allow you to dissociate the account from a SSO provider. But most I have encountered are just clueless. Some services, the system is designed so bad that I cannot change the email.
I remember l1 support for some company stating emails are immutable because it’s more secure that way. Such bullshit.
this bypass event is yet another reason to avoid using Google/Apple/Facebook as SSO provider. These companies have time and time again proved they are pregnable.
Fortunately, thanks to password managers it makes creating complicated passwords with hundreds of services much easier.
To add, the welcome email doesn't directly say the domain used
Related
Blog.ethereum.org Mailing List Incident
A phishing email targeted 35,794 Ethereum blog subscribers, attempting to drain wallets through a malicious link. Security measures were promptly taken, no funds were lost, and further precautions are underway.
Google Gemini scans files on Google Drive without permission – can't be disabled
Google's Gemini AI scans Google Drive PDFs without consent, sparking privacy concerns. Users struggle to disable scanning, possibly linked to Google Workspace Labs. Lack of control raises privacy and data security issues.
Google's Gemini AI caught scanning Google Drive PDF files without permission
Google's Gemini AI scans Google Drive PDFs without consent, sparking privacy concerns. Users struggle to disable this feature, raising questions about user control and data privacy within AI services.
Gemini AI caught scanning Google Drive hosted PDF files without permission
Google's Gemini AI scans PDFs on Google Drive without consent, raising privacy concerns. Users struggle to disable the feature, possibly linked to Google Workspace Labs settings. Lack of transparency emphasizes privacy risks.
Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks
Researchers found Squarespace's weak security defaults allowed hackers to hijack domains, targeting cryptocurrency businesses. Migration from Google Domains left accounts vulnerable, leading to phishing attacks. Squarespace improved security measures post-incident.