TechShoutTechShout
  • Home
  • Features
    FeaturesShow More
    games that are like minecraft
    34 Games Like Minecraft: Explore, Build, Survive With Friends
    Aug 1, 2024
    Fairy-tale Tower
    27 Magical Minecraft Fairy Builds for Every Fantasy Lover
    Aug 20, 2024
    Face Recognition Search Engines
    Top 9 Face Recognition Search Engines for Accurate Results
    May 6, 2024
    AI Headshot Photo Generators
    11 AI Headshot Generators For Professional Photos [Free & Paid]
    May 6, 2024
    Snapchat Planets Order In Friend Solar System
    Snapchat Planets Order In Friend Solar System: Meaning & How It Works
    May 2, 2024
  • Alternatives
    AlternativesShow More
    Game Like Gang Beasts
    14 Must-Play Games Like Gang Beasts For Party Game Enthusiasts
    Jan 6, 2024
    games like kenshi
    22 Games Like Kenshi For The Intrepid Player
    Dec 13, 2023
    Omegle Alternatives
    13 Omegle Alternatives For Random Video Chatting [2024]
    Jan 6, 2024
    Best ThinkGeek Alternatives
    17 Best ThinkGeek Alternatives: Ultimate Guide To Geek Shopping
    Nov 19, 2023
    Games like Core Keeper
    18 Games like Core Keeper: [The Ultimate Guide]
    Jan 3, 2024
  • Categories
    • Apple
    • Games
    • Internet
    • Mobile Phones
    • Gadgets
    • Code
    • Software
    • Hardware
    • Cryptocurrency
    • Artificial Intelligence
    • Laptops
    • Business
    • Security
    • Electric
    • Social Media
  • About Us
    • Who We Are
    • Privacy Policy
    • Editorial Policy
    • Contact Us
    • Advertise
Reading: Google Workspace Exploit Allows Hidden Data Theft From Drive Files
Share
Font ResizerAa
TechShoutTechShout
Font ResizerAa
  • Home
  • Alternatives
  • Features
  • Games
  • Guides
Search
  • Home
    • About Us
    • Privacy Policy
    • Editorial Policy
    • Contact Us
    • Advertise
    • Sitemap
  • Categories
    • Alternatives
    • Anime
    • Apple
    • Artificial Intelligence
    • Business
    • Code
    • Cryptocurrency
    • Electric
    • Features
    • Gadgets
    • Games
    • General
    • Guides
    • Hardware
    • Internet
    • Laptops
    • Mobile Phones
    • Science
    • Security
    • Social Media
    • Software
    • Space
    • Tech Reviews
    • TVs
Follow US
Home > Security > Google Workspace Exploit Allows Hidden Data Theft From Drive Files

Google Workspace Exploit Allows Hidden Data Theft From Drive Files

Bertila Helena
By Bertila Helena - Deputy Editor Last updated: Oct 29, 2023
2 Min Read
SHARE

Can Others See Whats In My Google DriveCybersecurity researchers have allegedly discovered a forensic security deficiency in Google Workspace which means that hackers can steal data from a private or shared Google Drive folder without any trace.

 

According to cloud and software-as-a-service security startup, Mitiga Security, once a malicious user has accessed a Google Drive account, they can exfiltrate data without being recorded at all.

 

Google Workspace includes Gmail, Drive, Sheets, Slides, Calendar, Meet and Chat. The Google Drive vulnerability affects only users who do not have a paid enterprise license for Workspace.

 

This means anyone with a free account may not be able to trace data theft from their Google Drive.

 

Of course, a threat actor would have to break into your Google account in the first place, in order to access your Drive.

 

For copying a file to and from Google Drive “source_copy” and “copy” log records are created automatically. And for for downloading a file, there is a “download” log record.

 

The forensic security deficiency described by Mitiga is a potential problem since only “source_copy” log records are made for free Workspace accounts.

 

So it would be almost impossible for a user without a paid Workspace license to figure out if any files have been stolen from their Drive.

 

This also poses a threat to organizations since hackers can disable logging and recording by cancelling a victim’s paid license and switching to the free “Cloud Identity Free” license. They can then steal Google Drive data without leaving a trace, and then reassign the license.

 

“A threat actor who gains access to an admin user can revoke the user’s license, download all their private files, and reassign the license,” the researchers explained.

 

The experts also notified Google of these findings, but are yet to receive a response.

Was this article helpful?
YesNo

You Might Also Like

Chatbot Scams: How To Protect Yourself

How Does Database Security Risk Assessment Guard Sensitive Information?

After LastPass Data Breach, Can Password Managers Still Be Trusted?

8 Easy Ways To Stay Secure Online

4 Ways Digital Privacy and Security Have Improved In 2022

Share This Article
Facebook Twitter Flipboard Pinterest Copy Link Print
Share
bertila-photo
By Bertila Helena Deputy Editor
Follow:
Bertila Helena has been a guiding voice in tech, gaming, and anime at TechShout since 2009. With a career spanning over 14 years, she has developed a keen eye for technological trends and their cultural impact. Her work reflects a deep understanding of the digital landscape as well as her enthusiasm and expertise. Bertila's expansive knowledge in the field is paralleled by an equally passionate coverage of gaming and anime, where she delves into narratives and their interplay with cultural mores. Her love for anime was kicked off by Ghost in the Shell and Neon Genesis Evangelion, while her passion for gaming started with Prince of Persia, Quake, Half-Life, Counter-Strike and NFS.
Previous Article Sniffer Egg Minecraft 1.20 Trails & Tales Update Makes Netherite Armor Tougher To Craft
Next Article Minecraft Sniffers Minecraft For Chromebook Is Now A Thing

Trending Stories

Demand Planning
Software

Top Features of Advanced Demand Planning Software

games that are like minecraft
Features

34 Games Like Minecraft: Explore, Build, Survive With Friends

Fairy-tale Tower
Features

27 Magical Minecraft Fairy Builds for Every Fantasy Lover

Business Automation POS
Business

How To Boost Productivity with Data Analytics & Automation of Business Operations

dress to impress dti outfit
Games

Roblox Dress To Impress (DTI) Codes (August 2024) *Updated*

Cybersecurity - Tackling Multi-Vector Attacks
Security

Cybersecurity Resilience: Tackling Complex Multi-Vector Attacks

Follow us on Social Media:

Facebook Twitter Youtube Pinterest

©TechShout.com 2005 - 2024. All Rights Reserved.

More from TechShout

  • About Us
  • Privacy Policy
  • Editorial Policy
  • Contact Us
  • Advertise
  • Sitemap
Welcome Back!

Sign in to your account

Lost your password?