Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    KadNap Malware Turning Asus Routers Into Botnets

    March 10, 2026

    AI Is Studying From the Information. Now Publishers Wish to Get Paid

    March 10, 2026

    New “LeakyLooker” Flaws in Google Looker Studio Might Allow Cross-Tenant SQL Queries

    March 10, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»New “LeakyLooker” Flaws in Google Looker Studio Might Allow Cross-Tenant SQL Queries
    AI Ethics & Regulation

    New “LeakyLooker” Flaws in Google Looker Studio Might Allow Cross-Tenant SQL Queries

    Declan MurphyBy Declan MurphyMarch 10, 2026No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    New “LeakyLooker” Flaws in Google Looker Studio Might Allow Cross-Tenant SQL Queries
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Ravie LakshmananMar 10, 2026Database Safety / Vulnerability

    Cybersecurity researchers have disclosed 9 cross-tenant vulnerabilities in Google Looker Studio that might have permitted attackers to run arbitrary SQL queries on victims’ databases and exfiltrate delicate information inside organizations’ Google Cloud environments.

    The shortcomings have been collectively named LeakyLooker by Tenable. There isn’t a proof that the vulnerabilities had been exploited within the wild. Following accountable disclosure in June 2025, the problems have been addressed by Google.

    The record of safety flaws is as follows –

    “The vulnerabilities broke basic design assumptions, revealed a brand new assault class, and will have allowed attackers to exfiltrate, insert, and delete information in victims’ providers and Google Cloud atmosphere,” safety researcher Liv Matan stated in a report shared with The Hacker Information.

    “These vulnerabilities uncovered delicate information throughout Google Cloud Platform (GCP) environments, probably affecting any group utilizing Google Sheets, BigQuery, Spanner, PostgreSQL, MySQL, Cloud Storage, and virtually another Looker Studio information connector.”

    Profitable exploitation of the cross-tenant flaws might allow risk actors to achieve entry to whole datasets and initiatives throughout completely different cloud tenants.

    Attackers might scan for public Looker Studio experiences or receive entry to personal ones that use these connectors (e.g., BigQuery) and seize management of the databases, permitting them to run arbitrary SQL queries throughout the proprietor’s whole GCP undertaking.

    Alternatively, a sufferer creates a report as public or shares it with a particular recipient, and makes use of a JDBC-connected information supply comparable to PostgreSQL. On this situation, the attacker can make the most of a logic flaw within the copy report characteristic that makes it potential to clone experiences whereas retaining the unique proprietor’s credentials, enabling them to delete or modify tables.

    One other high-impact path detailed by the cybersecurity firm concerned one-click information exfiltration, the place sharing a specifically crafted report forces a sufferer’s browser to execute malicious code that contacts an attacker-controlled undertaking to reconstruct whole databases from logs.

    “The vulnerabilities broke the basic promise {that a} ‘Viewer’ ought to by no means be capable of management the info they’re viewing,” Matan stated, including they “might have let attackers exfiltrate or modify information throughout Google providers like BigQuery and Google Sheets.”

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    SurxRAT Android Malware Makes use of LLMs for Phishing and Information Theft

    March 10, 2026

    Hacker abusing .arpa area to evade phishing detection, says Infoblox

    March 10, 2026

    INC Ransom Risk Targets Australia And Pacific Networks

    March 9, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    KadNap Malware Turning Asus Routers Into Botnets

    By Idris AdebayoMarch 10, 2026

    The Black Lotus Labs group at Lumen has found a complicated new malware named “KadNap.”…

    AI Is Studying From the Information. Now Publishers Wish to Get Paid

    March 10, 2026

    New “LeakyLooker” Flaws in Google Looker Studio Might Allow Cross-Tenant SQL Queries

    March 10, 2026

    Self-driving vehicles might reduce crashes — however make site visitors and sprawl worse

    March 10, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.