Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Flaws in Google Looker Studio Allow Data Breach

Critical Flaws in Google Looker Studio Allow Data Breach

Posted on March 16, 2026 By CWS

In a recent cybersecurity revelation, nine vulnerabilities termed ‘LeakyLooker’ were uncovered in Google Looker Studio, a cloud-based data visualization and business intelligence platform. These flaws could have enabled attackers to execute unauthorized SQL queries, access confidential data, and alter records within Google Cloud services without explicit user consent. Google has since addressed these issues following responsible disclosure.

Understanding Google Looker Studio

Google Looker Studio, previously known as Data Studio, is designed to connect with various live data sources including BigQuery, Google Sheets, and Cloud Storage. It allows for the creation of real-time reports that can be shared via specific user credentials or public links. This powerful feature set, however, also introduced significant security risks.

The vulnerabilities exploited the platform’s permission-sharing model, which is similar to that of Google Docs. The platform supports two authentication methods: Owner Credentials, where data is accessed using the report owner’s authentication, and Viewer Credentials, which require individual user authentication.

The Exploitation Paths

Researchers from Tenable identified two distinct attack paths based on these credential models. The first, termed ‘0-click attacks’, involved exploiting Owner Credentials by crafting server-side requests that manipulated data as if they were the owner, without needing the victim’s interaction. The second, known as ‘1-click attacks’, allowed attackers to use manipulated report links to execute malicious queries when opened by unsuspecting users.

The researchers disclosed nine specific flaws, including zero-click SQL injections and cross-tenant data leaks, highlighting significant vulnerabilities in database connectors and report features.

Details of the Vulnerabilities

One of the most critical vulnerabilities, TRA-2025-28, allowed attackers to run arbitrary SQL commands through BigQuery by manipulating user-controlled column aliases. Using SQL comments and specific functions, they bypassed input filters, enabling unauthorized data access.

Another notable issue, the ‘Sticky Credential’ flaw (TRA-2025-29), was found in the ‘Copy Report’ feature of Looker Studio. This allowed attackers to inherit and misuse the original report owner’s credentials, executing operations like ‘DELETE’ commands without knowing the password.

For 1-click attacks, researchers used Looker Studio’s NATIVE_DIMENSION feature to inject SQL into calculated fields, bypassing keyword filters. This method allowed attackers to extract data systematically, reconstructing entire databases silently.

Preventive Measures and Future Outlook

Though there is no indication these vulnerabilities were exploited in the wild, Google has deployed patches across all Looker Studio services. Security professionals are advised to audit user access, treat BI connectors as critical security components, and revoke unnecessary data source connections.

As cybersecurity threats evolve, continuous monitoring and proactive measures remain essential. Staying informed about platform updates and security patches is crucial for safeguarding sensitive data.

Follow us on Google News, LinkedIn, and X for the latest cybersecurity news. For more information or to share your stories, please contact us.

Cyber Security News Tags:business intelligence, cloud security, Cybersecurity, data breach, data exfiltration, Google Cloud, Google Looker Studio, security patch, SQL injection, Vulnerabilities

Post navigation

Previous Post: Cyberattack Foiled at Poland’s Nuclear Research Facility
Next Post: DRILLAPP Backdoor Exploits Microsoft Edge in Ukraine

Related Posts

Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO Threat Actors Actively Hacking Websites to Inject Malicious Links and Boost their SEO Cyber Security News
Malicious Skills Found in OpenClaw’s ClawHub Marketplace Malicious Skills Found in OpenClaw’s ClawHub Marketplace Cyber Security News
Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments Iran-Nexus Hackers Abuses Omani Mailbox to Target Global Governments Cyber Security News
AI Identity Visibility Lacking in Enterprises, Study Finds AI Identity Visibility Lacking in Enterprises, Study Finds Cyber Security News
Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code Critical Vulnerability in SmarterMail Let Attackers Execute Remote Code Cyber Security News
Microsoft Data Center Outage Affects Windows 11 Updates Microsoft Data Center Outage Affects Windows 11 Updates Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark