Worrying YouTube security flaw exposed billions of user emails


- A researcher has discovered a worrying YouTube security vulnerability
- The flaw allowed outsiders to gain access to all YouTube account emails
- This has since been patched, so users should update as soon as possible
Experts have warned that any email from a YouTube account could be pulled from Google with a ‘relatively simple exploit’
A researcher who goes by Brutecat managed to leverage several vulnerabilities across Google products to access the email address of any YouTube user, CyberNews reports.
Google has now patched the flaw, but this does represent a serious risk to the privacy of users, and could put them in danger of phishing attacks. Around 1 billion hours of YouTube is watched daily, with almost 2.5 billion users and 51 million channels – so privacy is important, here’s what we know.
Bounty hunters
The vulnerabilities were discovered because the researcher was “digging through the Internal People API (staging)” and noticed “something interesting”. They found that by blocking if you block someone on YouTube, you can leak their Google account identifier.
To continue, the researcher discovered that by clicking the three dot context menu, the GAIA ID was included in the server response, so there was no need to block the channel – meaning this could be escalated to every YouTube account – all four billion of them.
Then, by looking into old Google products, they discovered that the Pixel Recorder contained a bug that would allow them to convert the exposed GAIA ID to an email address. At first, when they did this, the victim would receive an email notification – which lowers the impact of the vulnerability quite significantly. However, they discovered a work around;
“That’s when we realized – if it’s including our recording title in the email subject, perhaps it wouldn’t be able to send an email if our recording title was too long.”
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
This worked – and when the recording title was lengthened to 2.5 million letters, “bingo! No notification email”.
For the disclosure of the flaw, the researcher was awarded a $10,633 bounty. There’s a long standing tradition of software service providers offering bug bounties for security researchers, with Google handing out $10 million in bounties in 2023.
The report was sent on September15 2024 – and in November, the first award of $3,133 was given, with the rationale: “Exploitation likelihood is medium. Issue qualified as an abuse-related methodology with high impact.”
By December, a further $7,500 was given, this time because “exploitation likelihood is high. Issue qualified as an abuse-related methodology with high impact” – thanks to an updated report from the product team.
The risk to users
Clearly, Google has identified a risk for the abuse of this flaw – but what is the risk for users? Well, since login credentials, passwords, or other personally identifiable information is not a part of this attack – that just leaves social engineering attacks via email.
We say ‘just’, but phishing attacks are a serious concern, and they claim millions of victims each year – and can lead to much more serious crimes like identity theft or fraud.
If a cybercriminal does email you, there are big red flags you can look out for. The first of all, is their email address – if it’s G00gle or M1crosoft instead of their legitimate addresses, don’t open it. Or, if you get a completely unexpected email from a ‘friend’ from an account you don’t recognize – especially one that urges action (i.e. asks you to click a link, send over money, buy a gift card, etc) – then be very very suspicious.
If you’re automatically suspicious of the emails you receive, you’ll be in a better position.
To be safe, you should create strong and secure passwords for each account – and make sure to change them as often as you can remember to.
The final thing to look for is attachments – if the account who sent the account is unknown and the email contains images, links, or documents – this is suspicious. QR codes can be malicious, so don’t scan anything you’re not certain is safe.
You might also like
A researcher has discovered a worrying YouTube security vulnerability The flaw allowed outsiders to gain access to all YouTube account emails This has since been patched, so users should update as soon as possible Experts have warned that any email from a YouTube account could be pulled from Google with…
Recent Posts
- UK private health services firm told to pay up $2m for ransomware hit
- Twelve South’s Find My-compatible charger is on sale starting at just $49
- 8 Best Projectors According to Our Reviewers (2025)
- US soldier pleads guilty to AT&T and Verizon cyberattacks, linked to Snowflake data theft
- The best gaming keyboards of 2025
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010