No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace

June 4, 2023
in Protection
0
Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace



A lack of event logging in the free-subscription version of Google Workspace can allow attackers to download data from Google Drive without leaving behind a trace of their illicit activity.

Researchers on a team from Mitiga discovered what they call a key “forensic security deficiency” in the popular hosted productivity app, which arises due to the lack of log generation for users who don’t have a paid enterprise license for Workspace. In a Mitiga blog post published May 30, the team noted that the situation leaves enterprises open to insider threats and other potential data leaks.

Though users with a paid license, such as Google Workspace Enterprise Plus, enjoy the benefit of visibility into Google Drive activity through “drive log events” — which record actions such as copying, deleting, downloading, and viewing files — those with a default Cloud Identity Free license don’t, the researchers said. This makes organizations blind to potential data manipulation and exfiltration attacks, limiting how quickly and effectively organizations can respond. That’s because they have little to no chance to correctly assess what data has been stolen — or if any data has been stolen at all.

“In Google specifically, the free license is the default when a new user is added to your domain, meaning you won’t receive any logs on Google Drive activity from their private Drive,” Or Aspir, cloud security research team leader at Mitiga, tells Dark Reading. “This is the main problem because without those logs, you are blind to users potentially downloading the data on their private Drive.”

To boot, though enterprises that use Google Workspace across their corporate employees may issue enterprise licenses — and thus have the visibility that logging provides — they can still be at risk for data theft if users download files from a shared enterprise drive to their personal Google Drive, which won’t be protected, Aspir says.

“If users have permissions to access some shared company drives, they can copy the files from the shared Drive to their private Drive … and the company will not receive any logs of the user downloading the copied files from their private drive,” he explains.

How Attackers Can Exploit the Google Drive Deficiency

There are two key scenarios in which this lack of visibility presents a problem, the researchers outlined in their post. The first is if a user’s account is compromised by a threat actor, either by becoming an admin or merely by gaining access to that account, they wrote.

“A threat actor who gains access to an admin user can revoke the user’s license, download all their private files, and reassign the license,” they explained in the post. In this case, the only log records that would be generated are the activity of revoking and assigning a license, under the Admin Log Events, the researchers said.

Meanwhile, a threat actor who gains access to a user without a paid license but still uses the organization’s private drive can download all the drive’s files without leaving any trace, the researchers said.

The second threat scenario would be most likely to occur during employee offboarding, when a corporate user is leaving the company and thus having their license removed before actually disabling/removing the employee as a Google user, the researchers said.

The employee (or any user who isn’t assigned a paid license) also can potentially download internal files from his or her private drive or private Google Workspace without any notice due to the lack of logging, posing an insider threat or potentially exposing that data to an outside attacker, they added. A user who still uses a company’s private drive also can download drives to a private Google Workspace without any log record, the researchers said.

“Either way, without a paid license, users can still have access to shared drive as viewers,” they explained in the post. “A user or a threat actor can copy all the files from the shared drive to their private drive and download them.”

How Enterprises Can Respond

Mitiga reached out to Google about the issue, but the researchers said they have not yet received a response, adding that Google’s security team typically doesn’t recognize forensics deficiencies as a security problem.

This highlights a concern when working with software-as-a-service (SaaS) and cloud providers, in that organizations that use their services “are solely dependent on them regarding what forensic data you can have,” Aspir notes. “When it comes to SaaS and cloud providers, we’re talking about a shared responsibility regarding security because you can’t add additional safeguards within what is given.”

For example, an organization is entirely dependent on what Google Workspace provides, Aspir says. In his opinion, that info should be “all logs needed in order for enterprises to understand if something bad happened, and what exactly happened.”

Fortunately, there are steps that organizations using Google Workspace can take to ensure that the issue outlined by Mitiga isn’t exploited, the researchers said. This includes keeping an eye out for certain actions in their Admin Log Events feature, such as events about license assignments and revocations, they said.

“If these events are happening in quick succession, it could suggest that a threat actor is revoking and reassigning licenses in your environment,” they wrote in the post. “As a result, we suggest conducting regular threat hunts in Google Workspace that include searching for this activity.

Organizations also can add “source_copy” events in threat hunts to catch a case in which an employee or a threat actor copies files from the shared drive to a private drive and downloads them from there, the researchers said.

Overall, organizations “need to understand that if there is a user with a free license, that user can download or copy data from the organization’s private Google Drive and there will be no log of the activity,” Aspir says. “Be very careful of users inside of the enterprise who do not have a paid license.”

Editorial Team

Editorial Team

Related Posts

Follow the Best Deals From Amazon's Big Spring Sale in Real Time
Protection

Follow the Best Deals From Amazon’s Big Spring Sale in Real Time

March 25, 2026
This 15-Inch M4 MacBook Air Is $300 Off for the Amazon Big Spring Sale
Protection

This 15-Inch M4 MacBook Air Is $300 Off for the Amazon Big Spring Sale

March 25, 2026
The DJI Osmo 360 Essential Combo Is Over $200 Off for Amazon's Spring Sale
Protection

The DJI Osmo 360 Essential Combo Is Over $200 Off for Amazon’s Spring Sale

March 25, 2026
This Fire TV Stick Is Already 50% Off for the Amazon Spring Sale
Protection

This Fire TV Stick Is Already 50% Off for the Amazon Spring Sale

March 25, 2026
Spotify's New 'SongDNA' Is Actually a Great Way to Learn More About Your Music
Protection

Spotify’s New ‘SongDNA’ Is Actually a Great Way to Learn More About Your Music

March 25, 2026
The Best Ways to Make Use of Those Spare USB Ports on Your TV or Monitor
Protection

The Best Ways to Make Use of Those Spare USB Ports on Your TV or Monitor

March 25, 2026
Load More
Next Post
Why Employees Should Have an IRA Separate From Their Work 401(k)

Why Employees Should Have an IRA Separate From Their Work 401(k)

Popular News

  • Oil prices fall on reports of a U.S. ceasefire proposal with Iran

    Oil prices fall on reports of a U.S. ceasefire proposal with Iran

    0 shares
    Share 0 Tweet 0
  • BlackRock’s Fink on why he won’t cash out private-credit investors: ‘Those are the rules, live with it.’

    0 shares
    Share 0 Tweet 0
  • L&G enters $1bn strategic partnership with Enosis Capital

    0 shares
    Share 0 Tweet 0
  • How to Contact Hilton Customer Service

    0 shares
    Share 0 Tweet 0
  • US gasoline prices to rise after attack on Iran, analysts warn

    0 shares
    Share 0 Tweet 0

Latest News

Paychex Q3 2026 slides: revenue surges 20% on Paycor integration

Paychex Q3 2026 slides: revenue surges 20% on Paycor integration

March 25, 2026
0

Paychex Q3 2026 slides: revenue surges 20% on Paycor integration

T3 FCU hailed as model blockchain crime-fighter by FATF

Virtuals Protocol brings AI agent commerce to Arbitrum in new integration

March 25, 2026
0

Virtuals Protocol is integrating its Agent Commerce Protocol with Arbitrum, aiming to make AI agents native DeFi users on a...

Five steps to building better savings habits

Five steps to building better savings habits

March 25, 2026
0

Good savings habits don’t usually start with a spreadsheet. They start with an idea – something you want to achieve....

Follow the Best Deals From Amazon's Big Spring Sale in Real Time

Follow the Best Deals From Amazon’s Big Spring Sale in Real Time

March 25, 2026
0

Daniel Oropeza Daniel Oropeza Staff Writer Experience Daniel is a Staff Writer for Lifehacker covering tech deals and reviewing TVs,...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.