Google says it recently fixed an authentication weakness that allowed crooks to circumvent the email verification required to create a Google Workspace account, and leverage that to impersonate a domain holder at third-party services that allow logins through Google’s “Sign in with Google” feature.
Last week, KrebsOnSecurity heard from a reader who said they received a notice that their email address had been used to create a potentially malicious Workspace account that Google had blocked.
“In the last few weeks, we identified a small-scale abuse campaign whereby bad actors circumvented the email verification step in our account creation flow for Email Verified (EV) Google Workspace accounts using a specially constructed request,” the notice from Google read. “These EV users could then be used to gain access to third-party applications using ‘Sign In with Google’.”
In response to questions, Google said it fixed the problem within 72 hours of discovering it, and that the company has added additional detection to protect against these types of authentication bypasses going forward.
Anu Yamunan, director of abuse and safety protections at Google Workspace, told KrebsOnSecurity the malicious activity began in late June, and involved “a few thousand” Workspace accounts that were created without being domain-verified.
Google Workspace offers a free trial that people can use to access services like Google Docs, but other services such as Gmail are only available to Workspace users who can validate control over the domain name associated with their email address. The weakness Google fixed allowed attackers to bypass this validation process. Google emphasized that none of the affected domains had previously been associated with Workspace accounts or services.
“The tactic here was to create a specifically-constructed request by a bad actor to circumvent email verification during the signup process,” Yamunan said. “The vector here is they would use one email address to try to sign in, and a completely different email address to verify a token. Once they were email verified, in some cases we have seen them access third party services using Google single sign-on.”
Yamunan said none of the potentially malicious workspace accounts were used to abuse Google services, but rather the attackers sought to impersonate the domain holder to other services online.
In the case of the reader who shared the breach notice from Google, the imposters used the authentication bypass to associate his domain with a Workspace account. And that domain was tied to his login at several third-party services online. Indeed, the alert this reader received from Google said the unauthorized Workspace account appears to have been used to sign in to his account at Dropbox.
Google said the now-fixed authentication bypass is unrelated to a recent issue involving cryptocurrency-based domain names that were apparently compromised in their transition to Squarespace, which last year acquired more than 10 million domains that were registered via Google Domains.
On July 12, a number of domains tied to cryptocurrency businesses were hijacked from Squarespace users who hadn’t yet set up their Squarespace accounts. Squarespace has since published a statement blaming the domain hijacks on “a weakness related to OAuth logins”, which Squarespace said it fixed within hours.
what Google says is simply not true. Attacks started around early June. I write here as one of the victims from that time. Even more – have a buganizer ticket numer from June the 7th with initial findings. It was fixed about month later.
I’ve had several bogus workplace trials started for my personal domains and had to dig to discover how to shut them down. The flaw is that no verification is required to sign up and start the trial. The trial will expire without control of the domain DNS entries but they should never allow it to even start if you can’t confirm via an in-domain email. This is kindergarten-level security but Google is more interested in making it easy to get hooked in. I have no idea what those first days of free trial allows them to do but it shouldn’t even be a question. I get a ‘thanks for signing up’ email that has no link to abort the fraudulent signup or to require a verification of any sort. Maybe that was pen testing that led to this breach or maybe it was amateurs hoping to cash in somehow. Google=evil.
Krebs, please give them hell for this!
The problem started much earlier than advertised. Two separate bad actors created bogus Google Workspace (and its predecessor Google Apps) accounts for my domain in 2012 and again in July, 2023. The first time, I took over the account by proving I owned the domain, and then eventually shut the account down. The second time, I decided not to shut the account down after taking it over, to prevent a third time.
The second time, Google had “improved” its security so that I had a devil of a time getting Google support to help me reclaim my domain in Google Workspace. You have to already be logged into the hacker’s account to get support, which means you have to hack the hacker before Google will provide support.
In 2012, Google created a regular account (not just a trial) using my domain name for the first impostor without ever asking for domain verification. In 2023, the account they created for the second impostor was just a trial.
Glad that I canceled Google Workplace a while ago and moved to Zoho.
Like too be HAPPY with Google
Som password
At first when I read this I thought it was about Thomas Matthew Crooks! I was confused…
Same
Yes, it’s Kinder Garden stuff and not as much a security threat. Will stick around with google for now.
Yes, it’s a basic security threat and not as much a security threat. Will stick around with google for now.
Will stick around with google for now. This was detected much earlier and cyber experts have used it in past to bypass gmail security.
Wikey.io found a way to authenticate without email….
Thank you for sharing this.