iTnews Asia
  • Home
  • News
  • Security

Google OAuth bug left accounts open to permanent compromise

Google OAuth bug left accounts open to permanent compromise

‘GhostToken’ exposed users to data theft and more.

By Richard Chirgwin on Apr 24, 2023 10:58AM

An OAuth bug discovered in Google’s Cloud Platform potentially allowed attackers to plant an application inside a victim’s account, leaving it permanently and undetectably compromised.

The bug was discovered by an Israeli security outfit, Astrix, who advised Google it had discovered the zero-day vulnerability in July 2022. 

A fix shipped earlier this month, the company said, detailing the vulnerability.

If a victim was successfully compromised , an attacker could plant a malicious app could read their Gmail account, access their files and photos, view their calendar, and track locations in Google maps, Astrix said – depending only on the permissions granted to the app.

An attack would start with a compromised file in Google Marketplace, the post explained.

When a user authorised it for installation, the app gets a token giving it access to the installer’s account with the permissions authorised by the user.

However, the GhostToken vulnerability would allow the attacker to then hide the app from the user.

“By exploiting the GhostToken vulnerability, attackers can hide their malicious application from the victim’s Google account application management page,” Astrix’s post claimed. 

“Since this is the only place Google users can see their applications and revoke their access, the exploit makes the malicious app unremovable from the Google account. 

“The attacker … can unhide their application and use the token to access the victim’s account, and then quickly hide the application again to restore its unremovable state.

"In other words, the attacker holds a ‘ghost’ token to the victim’s account.”

Google acknowledged the vulnerability in August 2022, and rolled a global update on April 7, Astrix said.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
astrix ghosttoken google oauth security

Related Articles

  • Malicious AI agents can severely disrupt APAC enterprises
  • A data-first AI strategy is critical to managing security threats in 2026
  • Malicious AI inputs are creating a new and critical security threat
  • Beware the pitfalls of using a ‘DIY security’ approach
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

A data-first AI strategy is critical to managing security threats in 2026

A data-first AI strategy is critical to managing security threats in 2026

Malicious AI agents can severely disrupt APAC enterprises

Malicious AI agents can severely disrupt APAC enterprises

Google suspends China's Pinduoduo app over malware

Google suspends China's Pinduoduo app over malware

Malicious AI inputs are creating a new and critical security threat

Malicious AI inputs are creating a new and critical security threat

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.