Friday, April 11, 2025
HomeGoogleGoogle Admits That Google Photos Sent Private Videos to Strangers And Allowed...

Google Admits That Google Photos Sent Private Videos to Strangers And Allowed to Download it

Published on

SIEM as a Service

Follow Us on Google News

Google admits that Google Photos were accidentally sent some of the user’s videos to strangers due to a “technical issue” between November 21st and November 25th.

Google Alerting users via Email notification that they have faced a technical issue in “Download your Data” service for Google Photos.

Download Your Data service that lets You export your backup data from the Google products you use, like your email, calendar, and photos. 

- Advertisement - Google News

A technical privacy issue had been in the tool has led to exposing the stored videos in Google Photos to strangers who don’t own those videos.

In results, some of your videos might be visible to a random person who can even download the videos from the backup.

This Privacy issue affected the small number of Google Photo’s Users doesn’t provide any details on how many people were affected, nor the number of individual videos that were distributed to strangers.

According to Google ” less than 0.01% of Photos users attempting Takeouts were affected, and no other product was affected.”

According to Jon Oberheide , CTO Duo Security “To be clear, this is a big screw-up. I hope the number of affected parties is small, but the impact to those parties could be high…and very unsettling. But my real beef is with this nonchalant and non-specific notification email. Hopefully, Google follows up with more comms.”

Google ended a Statement with apologies and said ” We are notifying people about a bug that may have affected users who used Google Takeout to export their Google Photos content between November 21 and November 25. These users may have received either an incomplete archive, or videos—not photos—that were not theirs. We fixed the underlying issue and have conducted an in-depth analysis to help prevent this from ever happening again. We are very sorry this happened.” “

Google said that it was fixed this software bug and the technical issue has been identified and resolved.

Also Read: How Does World’s Highly Secured Google Network Works? Google’s Effort & Dedication

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity...

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

Sensata Technologies Breached: Ransomware Attack Key Systems

Sensata Technologies Holding PLC, a global leader in sensor solutions and electrical protection, is...

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Google Introduces A2A Protocol, Empowering AI Agents to Team Up and Automate Workflows

Google Cloud announced the launch of a pioneering open protocol named Agent2Agent (A2A), aiming...

Chrome Use-After-Free Vulnerability Enables Remote Code Attacks

Google has rolled out a critical update for its Chrome browser, addressing a high-severity...

Hackers Conceal NFC Carders Behind Apple Pay and Google Wallet

In a disturbing evolution of financial fraud, cybercriminals are leveraging advanced techniques to exploit...