The Broad Channel Threat Intelligence Group's 8-step framework for defending Google Workspace against the rise of OAuth exploitation and identity-based attacks.
The identity security landscape for Google Workspace has fundamentally changed. The era of defending against simple phishing is over. We are now in an age of sophisticated, identity-centric attacks.
New research from Guardz, corroborated by our own intelligence, confirms that identity-based attacks surged by 127% in the last year. These are not opportunistic attacks; they are targeted campaigns.guardz
State-sponsored actors like APT28 and APT29 are no longer just targeting networks. They are specifically weaponizing the collaborative features of Google Workspace against you, turning your own tools into attack vectors.
Your Google Workspace tenant is likely vulnerable right now. The default settings prioritize collaboration, not a hardened security posture. This guide provides the emergency 8-step defense plan you must implement today.
The core problem for administrators is that the nature of the threat has shifted faster than the defenses. What worked last year is now dangerously inadequate.
| Attack Vector | 2025 Threat Data | Your Immediate Problem |
|---|---|---|
| OAuth Exploitation | 56% of all identity attacks guardz. | Your employees are granting malicious apps a permanent, API-based key to your company’s data. |
| Legacy Authentication | 89% of brute-force attempts target it guardz. | This outdated protocol allows attackers to bypass MFA completely, making password spraying highly effective. |
| MFA Bypass | 23% success rate against SMS guardz. | Your SMS-based multi-factor authentication provides a false sense of security; it’s a speed bump, not a wall. |
| Dormant Admin Accounts | 67% of organizations have at least one guardz. | You have “ghost” administrators with full privileges, left over from former employees, waiting to be exploited. |
Expert Quote: “In 2025, the Google Workspace perimeter is not your network; it’s the individual identity of each user and the permissions granted to each application. The battle has moved from the firewall to the OAuth consent screen.”
The primary attack surface is no longer your network edge. It’s the web of interconnected apps, legacy protocols, and human trust that defines your modern workspace.
These are not suggestions; they are immediate, mandatory actions to harden your Google Workspace tenant against the current wave of identity attacks.
The Problem: Your users have connected dozens of third-party apps to their Google accounts over the years. Many of these are forgotten, unvetted, and have excessive permissions to read emails and access files.
The Fix:
The Problem: Legacy authentication protocols (like Basic Authentication for mail clients) do not support MFA. Attackers know this and use these endpoints specifically to bypass your modern security controls.
The Fix:
The Problem: Your administrators are “super users.” A compromised admin account is a game-over scenario. SMS-based MFA is not strong enough to protect them from sophisticated phishing or SIM-swapping attacks.
The Fix:
The Problem: Your organization has a digital graveyard of old accounts from former employees and forgotten service accounts. Many of these still have active permissions, and some may even have administrative rights.
The Fix:
The Problem: Your default Drive sharing settings are likely too permissive, allowing users to create publicly accessible links. This is a primary vector for silent data exfiltration.
The Fix:
The Problem: While identity attacks are the entry point, they often lead to ransomware. Attackers who gain access to a user’s account can use Drive for desktop to encrypt files, which then sync to the cloud.
The Fix:
The Problem: You cannot defend against what you cannot see. Most organizations only review admin logs after an incident has occurred.
The Fix:
The Problem: Your employees are your last line of defense against OAuth attacks. They need to be trained to spot the new generation of threats.
The Fix:
Expert Quote: “The human firewall is your most important asset, but it requires continuous updates. In the age of AI and OAuth, you can’t just teach people not to click links; you have to teach them not to grant permissions.”
The threat against Google Workspace is no longer passive; it is active, targeted, and identity-driven. The 127% surge in attacks is a clear signal that your existing defenses are not enough. Follow these 8 steps today to harden your environment. Then, make continuous identity security and the principles of Zero Trust your number one priority.
To assess your organization’s current identity risk posture, use our Data Breach Simulator tool to model the impact of a compromised account.
The BC Threat Intelligence Group
This is not a warning about a future threat. This is a debrief of an…
Let's clear the air. The widespread fear that an army of intelligent robots is coming…
Reliance Industries has just announced it will build a colossal 1-gigawatt (GW) AI data centre…
Google has just fired the starting gun on the era of true marketing automation, announcing…
The world of SEO is at a pivotal, make-or-break moment. The comfortable, predictable era of…
Holiday shopping is about to change forever. Forget endless scrolling, comparing prices across a dozen…