Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Cloud API Key Exposure Risks Highlighted in New Study

Google Cloud API Key Exposure Risks Highlighted in New Study

Posted on February 28, 2026 By CWS

Recent research has uncovered a significant security risk involving Google Cloud API keys, which are typically used for billing purposes. These keys can potentially be exploited to access sensitive Gemini endpoints and retrieve private data, according to findings by Truffle Security.

Discovery of Vulnerable API Keys

Truffle Security’s investigation identified nearly 3,000 Google API keys embedded in client-side code, often used for services like embedded maps. These keys, marked by the prefix ‘AIza’, can allow unauthorized access to uploaded files and cached data, as well as incur charges to the user’s account through the Gemini API, despite not being originally intended for this purpose.

The issue arises when the Gemini API is activated on Google Cloud projects, granting existing API keys unintended access to Gemini endpoints. This creates opportunities for malicious actors to scrape websites, obtain these keys, and misuse them for unauthorized access to sensitive files and to generate substantial charges for the account holders.

Security Implications and Industry Response

Furthermore, Truffle Security found that new API keys in Google Cloud default to an ‘Unrestricted’ setting, making them applicable to all enabled APIs in a project, including Gemini. This has resulted in thousands of API keys being exposed on the public internet, with 2,863 live keys identified by the company. A similar report by Quokka revealed over 35,000 unique Google API keys embedded across 250,000 Android apps.

The risks extend beyond potential cost abuse. Organizations must consider the broader implications of AI-enabled endpoints interacting with prompts, generated content, and cloud services, which can significantly alter the risk profile associated with these keys.

Google’s Response and Recommendations

Google has acknowledged the issue and collaborated with researchers to resolve it. A spokesperson emphasized their commitment to user data protection and stated that proactive measures have been implemented to detect and block leaked API keys attempting to access the Gemini API.

While it’s unclear if these vulnerabilities have been exploited, a Reddit user recently reported a $82,314.44 charge due to a stolen Google Cloud API key. Users are advised to review their Google Cloud projects, verify AI-related API enablement, and rotate keys if necessary, focusing on older keys first, as they are more likely to have been publicly exposed.

Security experts emphasize the need for continuous security testing and vulnerability assessments. APIs, particularly those integrated with AI, require careful behavior profiling and anomaly detection to mitigate risks associated with changes in their operations or data access capabilities.

The Hacker News Tags:AI security, API key exposure, API security, cloud computing, cyber threats, Cybersecurity, data protection, Gemini API, Gemini endpoints, Google, Google Cloud, security breach, Truffle Security, Truffle Security report

Post navigation

Previous Post: Metasploit Update: New Exploits Target Linux, BeyondTrust
Next Post: Canadian Tire Data Breach Exposes Millions of Accounts

Related Posts

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install The Hacker News
Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts The Hacker News
Filling the Most Common Gaps in Google Workspace Security Filling the Most Common Gaps in Google Workspace Security The Hacker News
Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro The Hacker News
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools The Hacker News
CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Windows File Explorer for Malware Delivery
  • Canadian Tire Data Breach Exposes Millions of Accounts
  • Google Cloud API Key Exposure Risks Highlighted in New Study
  • Metasploit Update: New Exploits Target Linux, BeyondTrust
  • Pentagon Labels Anthropic a Supply Chain Risk Amid AI Dispute

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Windows File Explorer for Malware Delivery
  • Canadian Tire Data Breach Exposes Millions of Accounts
  • Google Cloud API Key Exposure Risks Highlighted in New Study
  • Metasploit Update: New Exploits Target Linux, BeyondTrust
  • Pentagon Labels Anthropic a Supply Chain Risk Amid AI Dispute

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News