Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

March 14, 2026

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

March 14, 2026

Post-Quantum Cryptography Webinar for Security Leaders

March 14, 2026
Facebook X (Twitter) Instagram
Saturday, March 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker
Cyber Security

Researchers Uncover ‘LeakyLooker’ Vulnerabilities in Google Looker

Team-CWDBy Team-CWDMarch 11, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A set of nine cross-tenant vulnerabilities in Google Looker Studio that could have enabled attackers to extract or manipulate sensitive cloud data has been uncovered by cybersecurity researchers.

The flaws, collectively named LeakyLooker by Tenable Research, affected the cloud-based business intelligence platform formerly known as Data Studio and potentially exposed data stored across several Google services.

The issues could have enabled attackers to run arbitrary SQL queries against victims’ databases and access datasets across different cloud tenants.

Looker Studio is widely used to transform raw data into dashboards and visual reports. It connects to multiple data sources, including Google BigQuery, Google Sheets and other SQL databases. Because the platform integrates deeply with Google Cloud infrastructure, the researchers said it introduced an unusually broad attack surface.

Two Separate Attack Paths

Tenable researchers identified weaknesses in how Looker Studio handled authentication and data connectors. The platform allows reports to retrieve data using either the report owner’s credentials or those of the viewer, depending on configuration.

According to the researchers, this architecture created two distinct attack paths that could be exploited by malicious actors.

  • 0-click attacks targeting owner credentials: Attackers could trigger SQL queries executed with the report owner’s authentication through crafted server-side requests

  • 1-click attacks targeting viewer credentials: Victims could unknowingly run malicious SQL queries when opening a manipulated report or link

These attack techniques were enabled by several underlying vulnerabilities in the platform, including SQL injection flaws in database connectors, data leaks through report elements such as hyperlinks or rendered images and a denial-of-wallet issue affecting BigQuery resources.

Potential Impact and Google’s Response

The vulnerabilities affected connectors used to link Looker Studio reports with a range of cloud services. These included BigQuery, Spanner, PostgreSQL, MySQL, Google Sheets and Cloud Storage.

The researchers said attackers could theoretically search for publicly accessible reports and use them as entry points to exfiltrate data, insert records or delete tables in connected databases.

Read more on cloud security vulnerabilities: Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds 

In another scenario, a report copy feature preserved stored database credentials when duplicated by a viewer. This allowed the new report owner to run custom SQL queries using the original database authentication, even without knowing the password.

All nine vulnerabilities were reported to Google through responsible disclosure. The company worked with Tenable to investigate the findings and implement fixes across the platform.

Because Looker Studio is a fully managed service, the patches were deployed globally and no action is required from customers.

Tenable researchers noted that the findings highlight how analytics platforms can become unexpected entry points into cloud environments.

They advised organisations to review report-sharing settings, limit unused connectors and treat BI integrations as part of their security attack surface.

Image credit: Stockinq / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFrance’s Cybersecurity Agency Reports Ransomware Attack Drop in 2025
Next Article AI Agents: The Next Wave Identity Dark Matter
Team-CWD
  • Website

Related Posts

Cyber Security

Why the EU Vulnerability Database Is a Blueprint For The Future

March 14, 2026
Cyber Security

What CISOs Should Know (And Do) About OpenClaw

March 13, 2026
Cyber Security

Expanded Identity Attack Vectors: From Document Fraud to Signal Manipu

March 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Common Apple Pay scams, and how to stay safe

January 22, 2026

What’s at stake if your employees post too much online

December 1, 2025

AI-powered financial scams swamp social media

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.