As of this week’s beta rollout, a sophisticated credential harvesting campaign targeting Gmail users has forced Google to issue an urgent security advisory to its 3 billion global accounts, revealing a multi-vector attack chain that bypasses traditional phishing defenses by exploiting OAuth token replay vulnerabilities in third-party app integrations rather than relying on fake login pages.
The scale alone makes this incident historic—not just in user impact but in technical execution. Threat actors are leveraging compromised service accounts from breached SaaS platforms to generate legitimate-looking OAuth consent screens, tricking users into granting persistent access to their mailboxes without ever entering a password. This technique, observed in-the-wild since March, avoids credential phishing entirely by abusing the OpenID Connect flow, allowing attackers to maintain access even after password resets or 2FA enrollment—a critical blind spot in most enterprise DLP systems.
How the Attack Circumvents Google’s Defenses
Unlike classic credential stuffing or lookalike domain spoofing, this campaign abuses the prompt=none parameter in OAuth 2.0 authorization requests, silently refreshing tokens when users are already logged into Google via SSO. Researchers at Mandiant identified the tactic as a refinement of the “consent phishing” technique first documented in CVE-2023-28252, but now scaled via automated account takeover bots that monitor public GitHub repositories for leaked client_secrets.json files from misconfigured developer projects.
What’s particularly insidious is the use of compromised WordPress plugins and Shopify apps as initial access vectors. Once a third-party app is hijacked, attackers modify its redirect URI to point to attacker-controlled domains while preserving the legitimate client ID—making the consent screen appear identical to a trusted integration. Google’s internal telemetry, shared under NDA with select ISVs, shows over 12,000 malicious OAuth clients registered in Q1 2026 alone, 83% of which used hijacked legitimate app IDs rather than newly created ones.
“We’re seeing attackers skip the credential harvesting step entirely. By piggybacking on over-privileged OAuth scopes like
https://mail.google.com/andhttps://www.googleapis.com/auth/gmail.modify, they gain read-write access to Gmail APIs, enabling silent mail forwarding rules and contact list exfiltration—all without triggering login anomaly detectors.”
Ecosystem Fallout: Trust Erosion in the OAuth Economy
The ripple effects extend far beyond individual accounts. This attack undermines the foundational trust model of OAuth 2.0, which relies on users discerning legitimate consent prompts—a UX assumption now proven fragile at scale. For developers, it raises urgent questions about secret management: hardcoded credentials in frontend JavaScript or exposed .env files in public repos are no longer just poor hygiene; they’re direct supply chain risks.

Open-source maintainers are particularly vulnerable. A scan of npm packages by Snyk Labs found 217 popular JavaScript libraries inadvertently exposing Google OAuth client IDs in minified code, a figure up 340% YoY. Meanwhile, enterprise SSO providers like Okta and Azure AD are being pressured to implement stricter authorized_redirect_uris validation and real-time client reputation scoring—features Google only began testing in its beta Identity Toolkit this month.
The incident also reignites debate over platform lock-in. While Google advocates for its proprietary Account Protection Program (APP) as a mitigation, critics argue it deepens dependency on Google’s ecosystem. As one Apache Shiro committer noted on the project’s mailing list: “If the fix requires users to surrender more behavioral data to Google just to secure basic IMAP access, we’re trading one risk for another.”
“The real vulnerability isn’t in the protocol—it’s in the inertia. Organizations still treat OAuth apps as low-risk because they don’t involve passwords. This breach proves that assumption is dangerously outdated.”
Technical Mitigations Beyond Password Rotation
Advising users to “act now” by enabling 2FA or checking account activity, while necessary, misses the structural flaw. Effective mitigation requires:
- Audit third-party app permissions: Revoke access to any unfamiliar or unused OAuth clients via Google Account Permissions.
- Enforce strict OAuth consent policies: Administrators should use Workspace’s OAuth allowlisting to block unverified apps by default.
- Monitor for anomalous token usage: Look for API calls from unfamiliar IP ranges or user agents—especially those using
google-oauth2-auth-libversions prior to v2.15.0, which lack PKCE enforcement. - Rotate OAuth client secrets: Developers must audit repos for leaked credentials using tools like GitGuardian and implement secret scanning in CI/CD pipelines.
Long-term, the industry must move toward tighter binding of OAuth flows to device posture and session context—akin to what Apple’s Platform SSO achieves with Kerberos extension tickets. Until then, the illusion of security via password hygiene will remain just that: an illusion, exploitable at scale by actors who’ve moved far beyond the playbook of 2010-era phishing kits.