Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Google Shared Private Videos With Wrong Users

A bug in the Google Takeout download service has resulted in some users’ videos being inadvertently shared with other people. 

A bug in the Google Takeout download service has resulted in some users’ videos being inadvertently shared with other people. 

The issue was revealed this week, when Google started sending notifications to impacted users. The incident, however, occurred last year, between November 21 and November 25. 

The bug, which Google describes as a technical issue, was triggered when users requested a Google “Download your data” export. The feature was designed to provide individuals with the ability to create backups of their data, including photos and videos in Google Photos, and leverages Takeout for the operation.

In the notification sent to the impacted users, Google reveals that those who used Takeout to download their data might have ended up with someone else’s videos in their Google Photos backups. 

The issue, it says, only impacts those who requested to download their data between November 21 and November 25 last year. 

“Unfortunately, during this time, some videos in Google Photos were incorrectly exported to unrelated users’ archives. One or more videos in your Google Photos account was affected by the issue,” Google wrote in the notification. 

What the company could not say, however, was how many of a user’s videos might have been affected in the incident. 

The Internet giant also informed users that those who downloaded their data might find it to be incomplete or to include other people’s videos. 

Advertisement. Scroll to continue reading.

Additionally, Google tells users that the problem was addressed, and encourages them to perform another export of their content, as well as to delete the previously created export. 

“We are notifying people about a bug that may have affected users who used Google Takeout to export their Google Photos content between November 21 and November 25. These users may have received either an incomplete archive, or videos—not photos—that were not theirs,” a Google spokesperson told SecurityWeek.

“We fixed the underlying issue and have conducted an in-depth analysis to help prevent this from ever happening again. We are very sorry this happened,” Google also said, noting that less than 0.01% of Google Photos users were impacted by the incident, and that the bug “did not impact other data type of the data users can download via Takeout.”

Related: Cloud(y) with a Chance of a Data Breach

Related: Google to Ban Less Secure Apps in G Suite

Related: Google Photos Flaw Allowed Hackers to Track Users

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.