Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google Data Breach Exposed 2.5 Billion Accounts – How to Secure Your Gmail

    August 28, 2025

    Anthropic Blocks Hacker Attempts to Misuse Claude AI for Cybercrime

    August 28, 2025

    WhatsApp Introduces AI-Powered “Writing Help” for Rewriting and Tone Adjustment

    August 28, 2025
    Facebook X (Twitter) Instagram Pinterest
    EchoCraft AIEchoCraft AI
    • Home
    • AI
    • Apps
    • Smart Phone
    • Computers
    • Gadgets
    • Live Updates
    • About Us
      • About Us
      • Privacy Policy
      • Terms & Conditions
    • Contact Us
    EchoCraft AIEchoCraft AI
    Home»Apps»Google Data Breach Exposed 2.5 Billion Accounts – How to Secure Your Gmail
    Apps

    Google Data Breach Exposed 2.5 Billion Accounts – How to Secure Your Gmail

    EchoCraft AIBy EchoCraft AIAugust 28, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Gmail
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Google has notified approximately 2.5 billion Gmail account holders after its Threat Intelligence Group (GTIG) identified a large-scale intrusion between August 8 and August 18.

    Highlights

    • Massive Intrusion: 2.5 billion Gmail accounts were affected after hackers exploited compromised OAuth tokens between August 8–18.
    • Enterprise Impact: Salesforce’s customer database and Salesloft’s Drift app were targeted, prompting token revocations and app removal.
    • Attack Tactics: Hacker groups UNC6395 and ShinyHunters used vishing (fake IT calls + phishing emails) to trick users into sharing credentials.
    • User Data at Risk: Leaked contact info is being weaponized for phishing and fake Google alerts, increasing takeover attempts.
    • Immediate Actions for Users: Update passwords, enable 2FA, review active sessions, and revoke unnecessary third-party app access.
    • OAuth Risks: Once stolen, tokens allow attackers to bypass logins. Weak validation, dangling buckets, and expired cookie reuse worsen the threat.

    The attack exploited compromised Open Authorization (OAuth) tokens, which allow third-party applications to access accounts securely.

    The incident also affected enterprises. GTIG confirmed that Salesforce’s customer database was targeted after attackers exploited OAuth tokens linked to the Salesloft Drift application.

    In response, Salesloft revoked all active tokens connected to Drift, and Salesforce removed the app from its marketplace while investigations continue.

    How the Breach Happened

    Google’s investigation attributed the attack to hacker groups, including UNC6395 and ShinyHunters (UNC6040). These actors are known for sophisticated tactics such as impersonating IT staff through scam calls and emails, a method known as “vishing.”

    By using spoofed phone numbers and convincing phishing messages, attackers tricked users into sharing credentials or authentication codes.

    Although passwords were not directly stolen, leaked customer and contact data from Salesforce are being used in targeted phishing and vishing campaigns.

    Security researchers have warned that attackers are exploiting Google’s brand to create convincing fake alerts, increasing the risk of account takeovers.

    Impact on Users

    Google has urged affected Gmail users to take immediate action. Recommended steps include:

    • Updating account passwords
    • Enabling two-factor authentication (2FA)
    • Reviewing devices and active sessions
    • Revoking third-party app access where not needed

    Security alerts were sent directly to impacted users, advising them to remain vigilant for unusual activity.

    Why OAuth Tokens Pose a Risk

    OAuth tokens are designed to provide secure access for third-party applications without sharing passwords.

    Once compromised, they can be abused to bypass traditional login protections. In this case, attackers leveraged token vulnerabilities to gain unauthorized access, highlighting how integrated services can expand the attack surface for both individuals and enterprises.

    Security researchers have previously flagged weaknesses in OAuth, including insufficient validation of parameters that could enable session hijacking. Additionally, risks extend beyond phishing.

    Misconfigured Google Cloud storage, often referred to as “dangling buckets,” can provide attackers with pathways for malware injection or data theft.

    Past campaigns have even revived expired authentication cookies using undocumented OAuth endpoints, enabling account takeovers despite password resets.

    While Google, Salesforce, and Salesloft acted quickly to contain the immediate threat, the breach underscores broader cybersecurity challenges.

    AI Apps Cyberattack Cybersecurity Gmail Google
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAnthropic Blocks Hacker Attempts to Misuse Claude AI for Cybercrime
    EchoCraft AI

    Related Posts

    AI

    Anthropic Blocks Hacker Attempts to Misuse Claude AI for Cybercrime

    August 28, 2025
    Apps

    WhatsApp Introduces AI-Powered “Writing Help” for Rewriting and Tone Adjustment

    August 28, 2025
    Apps

    Google Vids Introduces AI Avatars and Consumer-Friendly Video Editing

    August 27, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Search
    Top Posts

    Samsung Galaxy S25 Rumours of A New Face in 2025

    March 19, 2024383 Views

    CapCut Ends Free Cloud Storage, Introduces Paid Plans Starting August 5

    July 12, 2024292 Views

    Windows 12 Revealed A new impressive Future Ahead

    February 29, 2024230 Views
    Categories
    • AI
    • Apps
    • Computers
    • Gadgets
    • Gaming
    • Innovations
    • Live Updates
    • Science
    • Smart Phone
    • Social Media
    • Tech News
    • Uncategorized
    Latest in AI
    AI

    Anthropic Blocks Hacker Attempts to Misuse Claude AI for Cybercrime

    EchoCraft AIAugust 28, 2025
    AI

    Claude for Chrome: Anthropic Enters the AI Browser Race

    EchoCraft AIAugust 27, 2025
    AI

    Gemini 2.5 Flash Image: Google’s Latest Move in the AI Image Race

    EchoCraft AIAugust 26, 2025
    AI

    Elon Musk’s xAI Releases Grok 2.5 Model on Hugging Face

    EchoCraft AIAugust 24, 2025
    AI

    Meta Partners With Midjourney to Strengthen AI Image and Video Capabilities

    EchoCraft AIAugust 23, 2025

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Stay In Touch
    • Facebook
    • YouTube
    • Twitter
    • Instagram
    • Pinterest
    Tags
    2024 Adobe AI AI agents AI safety android Anthropic apple Apple Intelligence Apps ChatGPT Claude AI Copilot Cyberattack Elon Musk Gaming Gemini Generative Ai Google Grok AI India Innovation Instagram IOS iphone Meta Meta AI Microsoft NVIDIA Open-Source AI OpenAI PC privacy and Security Reasoning Model Robotics Samsung Smartphones Smart phones Social Media TikTok U.S Update whatsapp xAI YouTube
    Most Popular

    Samsung Galaxy S25 Rumours of A New Face in 2025

    March 19, 2024383 Views

    Insightful iQoo Z9 Turbo with New Changes in 2024

    March 16, 2024219 Views

    Apple A18 Pro Impressive Leap in Performance

    April 16, 2024173 Views
    Our Picks

    Google Tests AI-Powered Age Estimation to Shield Minors Across Its Products in the U.S.

    July 31, 2025

    Apple Previews Major Accessibility Upgrades, Explores Brain-Computer Interface Integration

    May 13, 2025

    Apple Advances Custom Chip Development for Smart Glasses, Macs, and AI Systems

    May 9, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • About Us
    © 2025 EchoCraft AI. All Right Reserved

    Type above and press Enter to search. Press Esc to cancel.

    Manage Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}