Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LeakyLooker Flaws in Google Looker Studio Exposed

LeakyLooker Flaws in Google Looker Studio Exposed

Posted on March 10, 2026 By CWS

Cybersecurity experts have revealed nine vulnerabilities in Google Looker Studio that posed significant threats to cloud security. These flaws, known collectively as LeakyLooker, had the potential to allow malicious actors to execute arbitrary SQL queries, compromising sensitive data within Google Cloud environments. Despite the severity, there is no evidence that these vulnerabilities were exploited before they were resolved by Google following responsible disclosure in June 2025.

Understanding the LeakyLooker Vulnerabilities

The LeakyLooker vulnerabilities were identified by the cybersecurity firm Tenable. These flaws disrupted essential design principles and identified a new class of attacks. They posed a risk of unauthorized data exfiltration, insertion, and deletion within affected Google Cloud services. Liv Matan, a security researcher, emphasized that these vulnerabilities could have exposed sensitive information across various Google Cloud Platform (GCP) environments, impacting services like Google Sheets, BigQuery, and Cloud Storage.

Exploitation of these cross-tenant vulnerabilities would allow attackers access to extensive datasets across different cloud tenants. Attackers could potentially manipulate public or private Looker Studio reports that used certain connectors, gaining control over entire databases and executing arbitrary SQL operations across the victim’s cloud projects.

Implications for Cloud Security

The vulnerabilities highlighted a critical flaw in how data security is managed across cloud services. In scenarios where a victim shared a report publicly or with specific individuals and used a JDBC-connected source, attackers could exploit a logic flaw in the report copying feature. This flaw allowed them to duplicate reports while maintaining the original owner’s credentials, enabling unauthorized data modifications.

Another severe vulnerability involved one-click data exfiltration. By sharing a specially crafted report, attackers could force a victim’s browser to execute malicious code, which could then contact an attacker-controlled project to reconstruct entire datasets from log files. This demonstrated how attackers could bypass the fundamental security promise that viewers should not control the data they access.

Future Outlook and Mitigations

Addressing these vulnerabilities is crucial for maintaining trust in cloud-based services. Google has taken steps to resolve these issues, ensuring that cloud environments remain secure. As cloud services continue to grow, it is imperative for organizations to remain vigilant and proactive in identifying and addressing potential security flaws.

The exposure of LeakyLooker vulnerabilities serves as a reminder of the importance of continuous security assessments and the implementation of robust security practices. Organizations are encouraged to conduct regular audits of their cloud environments and to stay informed about potential threats to safeguard their data integrity and security.

The Hacker News Tags:cloud environments, cloud security, cloud services, cross-tenant flaws, cyber threats, Cybersecurity, data connectors, data exfiltration, database security, Google Cloud, Google Looker Studio, LeakyLooker, SQL queries, SQL vulnerabilities, Tenable

Post navigation

Previous Post: iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies
Next Post: Kai Secures $125M to Enhance AI-Powered Cybersecurity

Related Posts

CISA Highlights Exploited Roundcube Vulnerabilities CISA Highlights Exploited Roundcube Vulnerabilities The Hacker News
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware The Hacker News
New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones The Hacker News
AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities AI Skill Exploits and Record DDoS Attack Highlight Cyber Vulnerabilities The Hacker News
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate The Hacker News
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage
  • Kali Linux Boosts Offline AI Penetration Testing
  • Kai Secures $125M to Enhance AI-Powered Cybersecurity
  • LeakyLooker Flaws in Google Looker Studio Exposed
  • iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT28 Deploys BEARDSHELL and COVENANT in Ukraine Espionage
  • Kali Linux Boosts Offline AI Penetration Testing
  • Kai Secures $125M to Enhance AI-Powered Cybersecurity
  • LeakyLooker Flaws in Google Looker Studio Exposed
  • iPhone Exploit Toolkit Linked to U.S. Contractor Used by Russian Spies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News