Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Snapdragon 8 Elite 2 Leak Hints at 4 Million+ AnTuTu Score Ahead of Official Launch

    September 1, 2025

    Microsoft’s Next Annual Windows 11 (25H2) Update Enters Release Preview Testing

    August 31, 2025

    Meta Faces Challenges in $14.3B Collaboration With Scale AI

    August 30, 2025
    Facebook X (Twitter) Instagram Pinterest
    EchoCraft AIEchoCraft AI
    • Home
    • AI
    • Apps
    • Smart Phone
    • Computers
    • Gadgets
    • Live Updates
    • About Us
      • About Us
      • Privacy Policy
      • Terms & Conditions
    • Contact Us
    EchoCraft AIEchoCraft AI
    Home»Apps»Google Data Breach Exposed 2.5 Billion Accounts – How to Secure Your Gmail
    Apps

    Google Data Breach Exposed 2.5 Billion Accounts – How to Secure Your Gmail

    EchoCraft AIBy EchoCraft AIAugust 28, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Gmail
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Google has notified approximately 2.5 billion Gmail account holders after its Threat Intelligence Group (GTIG) identified a large-scale intrusion between August 8 and August 18.

    Highlights

    • Massive Intrusion: 2.5 billion Gmail accounts were affected after hackers exploited compromised OAuth tokens between August 8–18.
    • Enterprise Impact: Salesforce’s customer database and Salesloft’s Drift app were targeted, prompting token revocations and app removal.
    • Attack Tactics: Hacker groups UNC6395 and ShinyHunters used vishing (fake IT calls + phishing emails) to trick users into sharing credentials.
    • User Data at Risk: Leaked contact info is being weaponized for phishing and fake Google alerts, increasing takeover attempts.
    • Immediate Actions for Users: Update passwords, enable 2FA, review active sessions, and revoke unnecessary third-party app access.
    • OAuth Risks: Once stolen, tokens allow attackers to bypass logins. Weak validation, dangling buckets, and expired cookie reuse worsen the threat.

    The attack exploited compromised Open Authorization (OAuth) tokens, which allow third-party applications to access accounts securely.

    The incident also affected enterprises. GTIG confirmed that Salesforce’s customer database was targeted after attackers exploited OAuth tokens linked to the Salesloft Drift application.

    In response, Salesloft revoked all active tokens connected to Drift, and Salesforce removed the app from its marketplace while investigations continue.

    How the Breach Happened

    Google’s investigation attributed the attack to hacker groups, including UNC6395 and ShinyHunters (UNC6040). These actors are known for sophisticated tactics such as impersonating IT staff through scam calls and emails, a method known as “vishing.”

    By using spoofed phone numbers and convincing phishing messages, attackers tricked users into sharing credentials or authentication codes.

    Although passwords were not directly stolen, leaked customer and contact data from Salesforce are being used in targeted phishing and vishing campaigns.

    Security researchers have warned that attackers are exploiting Google’s brand to create convincing fake alerts, increasing the risk of account takeovers.

    Impact on Users

    Google has urged affected Gmail users to take immediate action. Recommended steps include:

    • Updating account passwords
    • Enabling two-factor authentication (2FA)
    • Reviewing devices and active sessions
    • Revoking third-party app access where not needed

    Security alerts were sent directly to impacted users, advising them to remain vigilant for unusual activity.

    Why OAuth Tokens Pose a Risk

    OAuth tokens are designed to provide secure access for third-party applications without sharing passwords.

    Once compromised, they can be abused to bypass traditional login protections. In this case, attackers leveraged token vulnerabilities to gain unauthorized access, highlighting how integrated services can expand the attack surface for both individuals and enterprises.

    Security researchers have previously flagged weaknesses in OAuth, including insufficient validation of parameters that could enable session hijacking. Additionally, risks extend beyond phishing.

    Misconfigured Google Cloud storage, often referred to as “dangling buckets,” can provide attackers with pathways for malware injection or data theft.

    Past campaigns have even revived expired authentication cookies using undocumented OAuth endpoints, enabling account takeovers despite password resets.

    While Google, Salesforce, and Salesloft acted quickly to contain the immediate threat, the breach underscores broader cybersecurity challenges.

    AI Apps Cyberattack Cybersecurity Gmail Google
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAnthropic Blocks Hacker Attempts to Misuse Claude AI for Cybercrime
    Next Article Microsoft Unveils Its First Homegrown AI Models – MAI-Voice-1 & MAI-1-Preview
    EchoCraft AI

    Related Posts

    Computers

    Microsoft’s Next Annual Windows 11 (25H2) Update Enters Release Preview Testing

    August 31, 2025
    AI

    Meta Faces Challenges in $14.3B Collaboration With Scale AI

    August 30, 2025
    Science

    China Launches ‘Darwin Monkey’, a Neuromorphic Supercomputer Modeled on the Brain

    August 30, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Search
    Top Posts

    Samsung Galaxy S25 Rumours of A New Face in 2025

    March 19, 2024389 Views

    CapCut Ends Free Cloud Storage, Introduces Paid Plans Starting August 5

    July 12, 2024304 Views

    Windows 12 Revealed A new impressive Future Ahead

    February 29, 2024252 Views
    Categories
    • AI
    • Apps
    • Computers
    • Gadgets
    • Gaming
    • Innovations
    • Live Updates
    • Science
    • Smart Phone
    • Social Media
    • Tech News
    • Uncategorized
    Latest in AI
    AI

    Meta Faces Challenges in $14.3B Collaboration With Scale AI

    EchoCraft AIAugust 30, 2025
    AI

    Reliance Taps Google and Meta to Build India’s AI Backbone

    EchoCraft AIAugust 29, 2025
    AI

    xAI Launches Grok Code Fast 1, a Lightweight Agentic AI Model for Developers

    EchoCraft AIAugust 29, 2025
    AI

    Microsoft Unveils Its First Homegrown AI Models – MAI-Voice-1 & MAI-1-Preview

    EchoCraft AIAugust 29, 2025
    AI

    Anthropic Blocks Hacker Attempts to Misuse Claude AI for Cybercrime

    EchoCraft AIAugust 28, 2025

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Stay In Touch
    • Facebook
    • YouTube
    • Twitter
    • Instagram
    • Pinterest
    Tags
    2024 Adobe AI AI agents AI safety android Anthropic apple Apple Intelligence Apps ChatGPT Claude AI Copilot Cyberattack Elon Musk Gaming Gemini Generative Ai Google Grok AI India Innovation Instagram IOS iphone Meta Meta AI Microsoft NVIDIA Open-Source AI OpenAI PC privacy and Security Reasoning Model Robotics Samsung Smartphones Smart phones Social Media TikTok U.S Update whatsapp xAI YouTube
    Most Popular

    Samsung Galaxy S25 Rumours of A New Face in 2025

    March 19, 2024389 Views

    Alleged iPhone 17 Pro Geekbench Scores Hint at Significant A19 Pro Chip Performance Leap

    June 12, 2025244 Views

    Insightful iQoo Z9 Turbo with New Changes in 2024

    March 16, 2024219 Views
    Our Picks

    Google Tests AI-Powered Age Estimation to Shield Minors Across Its Products in the U.S.

    July 31, 2025

    Apple Previews Major Accessibility Upgrades, Explores Brain-Computer Interface Integration

    May 13, 2025

    Apple Advances Custom Chip Development for Smart Glasses, Macs, and AI Systems

    May 9, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • About Us
    © 2025 EchoCraft AI. All Right Reserved

    Type above and press Enter to search. Press Esc to cancel.

    Manage Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}