Monday, April 28, 2025
HomeGoogleGoogle Admits That Google Photos Sent Private Videos to Strangers And Allowed...

Google Admits That Google Photos Sent Private Videos to Strangers And Allowed to Download it

Published on

SIEM as a Service

Follow Us on Google News

Google admits that Google Photos were accidentally sent some of the user’s videos to strangers due to a “technical issue” between November 21st and November 25th.

Google Alerting users via Email notification that they have faced a technical issue in “Download your Data” service for Google Photos.

Download Your Data service that lets You export your backup data from the Google products you use, like your email, calendar, and photos. 

- Advertisement - Google News

A technical privacy issue had been in the tool has led to exposing the stored videos in Google Photos to strangers who don’t own those videos.

In results, some of your videos might be visible to a random person who can even download the videos from the backup.

This Privacy issue affected the small number of Google Photo’s Users doesn’t provide any details on how many people were affected, nor the number of individual videos that were distributed to strangers.

According to Google ” less than 0.01% of Photos users attempting Takeouts were affected, and no other product was affected.”

According to Jon Oberheide , CTO Duo Security “To be clear, this is a big screw-up. I hope the number of affected parties is small, but the impact to those parties could be high…and very unsettling. But my real beef is with this nonchalant and non-specific notification email. Hopefully, Google follows up with more comms.”

Google ended a Statement with apologies and said ” We are notifying people about a bug that may have affected users who used Google Takeout to export their Google Photos content between November 21 and November 25. These users may have received either an incomplete archive, or videos—not photos—that were not theirs. We fixed the underlying issue and have conducted an in-depth analysis to help prevent this from ever happening again. We are very sorry this happened.” “

Google said that it was fixed this software bug and the technical issue has been identified and resolved.

Also Read: How Does World’s Highly Secured Google Network Works? Google’s Effort & Dedication

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Blue Shield Exposed Health Data of 4.7 Million via Google Ads

Blue Shield of California has disclosed a significant data privacy incident affecting up to...

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials

Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building...