Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LeakyLooker Flaws in Google Looker Studio Exposed

LeakyLooker Flaws in Google Looker Studio Exposed

Posted on March 10, 2026 By CWS

Cybersecurity experts have revealed nine vulnerabilities in Google Looker Studio that posed significant threats to cloud security. These flaws, known collectively as LeakyLooker, had the potential to allow malicious actors to execute arbitrary SQL queries, compromising sensitive data within Google Cloud environments. Despite the severity, there is no evidence that these vulnerabilities were exploited before they were resolved by Google following responsible disclosure in June 2025.

Understanding the LeakyLooker Vulnerabilities

The LeakyLooker vulnerabilities were identified by the cybersecurity firm Tenable. These flaws disrupted essential design principles and identified a new class of attacks. They posed a risk of unauthorized data exfiltration, insertion, and deletion within affected Google Cloud services. Liv Matan, a security researcher, emphasized that these vulnerabilities could have exposed sensitive information across various Google Cloud Platform (GCP) environments, impacting services like Google Sheets, BigQuery, and Cloud Storage.

Exploitation of these cross-tenant vulnerabilities would allow attackers access to extensive datasets across different cloud tenants. Attackers could potentially manipulate public or private Looker Studio reports that used certain connectors, gaining control over entire databases and executing arbitrary SQL operations across the victim’s cloud projects.

Implications for Cloud Security

The vulnerabilities highlighted a critical flaw in how data security is managed across cloud services. In scenarios where a victim shared a report publicly or with specific individuals and used a JDBC-connected source, attackers could exploit a logic flaw in the report copying feature. This flaw allowed them to duplicate reports while maintaining the original owner’s credentials, enabling unauthorized data modifications.

Another severe vulnerability involved one-click data exfiltration. By sharing a specially crafted report, attackers could force a victim’s browser to execute malicious code, which could then contact an attacker-controlled project to reconstruct entire datasets from log files. This demonstrated how attackers could bypass the fundamental security promise that viewers should not control the data they access.

Future Outlook and Mitigations

Addressing these vulnerabilities is crucial for maintaining trust in cloud-based services. Google has taken steps to resolve these issues, ensuring that cloud environments remain secure. As cloud services continue to grow, it is imperative for organizations to remain vigilant and proactive in identifying and addressing potential security flaws.

The exposure of LeakyLooker vulnerabilities serves as a reminder of the importance of continuous security assessments and the implementation of robust security practices. Organizations are encouraged to conduct regular audits of their cloud environments and to stay informed about potential threats to safeguard their data integrity and security.

The Hacker News Tags:cloud environments, cloud security, cloud services, cross-tenant flaws, cyber threats, Cybersecurity, data connectors, data exfiltration, database security, Google Cloud, Google Looker Studio, LeakyLooker, SQL queries, SQL vulnerabilities, Tenable

Post navigation

Previous Post: iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies
Next Post: Kai Secures $125M to Enhance AI-Powered Cybersecurity

Related Posts

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection The Hacker News
[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them The Hacker News
PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads The Hacker News
Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025 The Hacker News
What Should We Learn From How Attackers Leveraged AI in 2025? What Should We Learn From How Attackers Leveraged AI in 2025? The Hacker News
Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP
  • Chinese Cyber Threat Targets Qatar Amid Middle East Unrest
  • SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FortiGate Firewalls Exploited by Cyber Attackers
  • Microsoft’s March 2026 Patch Tuesday Fixes 78 Vulnerabilities
  • Jazz Secures $61M to Revolutionize AI-Powered DLP
  • Chinese Cyber Threat Targets Qatar Amid Middle East Unrest
  • SAP Addresses Critical Bugs in FS-QUO and NetWeaver

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News