Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

April 10, 2026

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

April 10, 2026

Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs

April 10, 2026
Facebook X (Twitter) Instagram
Friday, April 10
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Google API Keys Quietly Gain Access to Gemini on Android Devices
Cyber Security

Google API Keys Quietly Gain Access to Gemini on Android Devices

Team-CWDBy Team-CWDApril 9, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A flaw in Google’s API key system has reportedly exposed mobile applications to unintended access to its Gemini AI platform.

According to a CloudSEK advisory published on April 8, the issue affects widely used Android apps and could allow attackers to access sensitive data, generate unexpected costs and disrupt services.

The vulnerability centers on Google’s long-standing API key format, originally designed for public-facing services such as Maps and Firebase.

CloudSEK found that when the Gemini API is enabled in a Google Cloud project, existing keys automatically gain access to AI endpoints without notification or user consent.

Silent Shift Creates Widespread Risk

This behavior marks a departure from earlier guidance, which stated that such keys were safe to embed in client-side code. Developers who followed those recommendations may now be unknowingly exposing credentials linked to advanced AI systems.

CloudSEK reportedly analyzed 10,000 Android apps using its BeVigil platform, identifying 32 active keys across 22 applications. These apps collectively account for more than 500 million installs.

In one confirmed case, researchers accessed user-uploaded audio files from an English-learning app via the Gemini Files API. The data included file metadata, timestamps and accessible links, indicating that private content could be retrieved using exposed keys.

“This is a structural flaw,” CloudSEK wrote. “Google merged the concept of ‘public keys’ with server-side AI secrets, and enabling Gemini should have triggered a mandatory key restriction or forced the creation of a new, scoped key.”

Read more on AI security vulnerabilities: Security Researchers Sound the Alarm on Vulnerabilities in AI-Generated Code

Financial and Security Implications

The risks linked to the vulnerability include:

  • Access to private files stored in Gemini

  • Unauthorized API usage leading to financial losses

  • Service disruption through quota exhaustion

The mobile ecosystem amplifies the threat, CloudSEK explained, as app packages can be easily downloaded and analyzed to extract embedded keys. Many of these keys persist across multiple versions, increasing long-term exposure.

Real-world incidents highlight the potential impact. One developer reported $15,400 in charges within hours of a compromised key being exploited. Another organization faced losses of $128,000, despite implementing security controls.

Researchers recommend that developers audit their cloud projects, rotate exposed keys and restrict API access to only the services required.

Infosecurity has reached out to Google for comment on these findings, but has not received a response at the time of publication.

Image credit: Nwz / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIran‑Backed Threat Actors Hit US CNI Providers via Internet‑Facing OT
Next Article TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
Team-CWD
  • Website

Related Posts

Cyber Security

Microsoft 365 Tenant Security: How to Stay in Control of Your Data

April 10, 2026
Cyber Security

GrafanaGhost Exploit Bypasses AI Guardrails for Silent Data Exfiltrati

April 8, 2026
Cyber Security

When the World Splits: Are Businesses Really Ready?

April 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

What is it, and how do I get it off my device?

September 11, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

How it preys on personal data – and how to stay safe

October 23, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.