Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

12th May 2026 | Blog Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

OAuth tokens don’t expire when employees leave, passwords change, or apps go rogue. Your security program needs to understand this risk and remove unneeded and abandoned entitlements asap.

Picture a spare key. You handed it to a contractor six months ago so they could fix your HVAC. The job is done. The contractor moved on. But the key still works, and you never asked for it back. That is more or less what happens every time someone at your company connects a third-party app to Google Workspace or Microsoft 365 using OAuth. Digital keys are created by your employees. They don’t expire, and in most organizations, nobody is tracking them, reviewing them, or removing them when no longer needed!

OAuth is the system behind those “Connect with Google” and “Allow access” buttons your team clicks every day. It lets apps read your calendar, send emails on your behalf, or pull data from your cloud storage, all without sharing your actual password. That sounds great. The catch is that the access token it creates sticks around long after you’ve forgotten the app exists. It doesn’t get canceled when an employee leaves. It doesn’t reset when someone changes their password. Your multi-factor authentication does nothing to stop an attacker who already holds a valid token.

Many Organizations Don’t Know about this Problem. Even Fewer Are Fixing It.

Research from Material Security found that 80% of security leaders consider unmanaged OAuth grants a critical or significant risk. That number has been high for years. Awareness may not be the main issue here, however, mitigating this threat is.

45% of organizations do nothing to monitor OAuth grants at scale

33% rely on manual tracking like spreadsheets and ad hoc reviews

A spreadsheet telling you which apps have access is not the same as knowing what those apps are doing with that access. One is a list. The other is security. Right now, most teams only have the list.

A Real Attack That Already Happened

In 2024 and 2025, a threat actor known as UNC6395 (tracked by Palo Alto Unit 42) used stolen OAuth refresh tokens from Drift, a sales engagement platform, to access the Salesforce environments of over 700 organizations. Drift had legitimate OAuth connections to those Salesforce accounts. The attacker got hold of those tokens, likely through earlier phishing attacks, and walked straight in through the front door.

What Made This Attack So Effective
Nothing looked suspicious. The tokens were valid. The app was trusted. The login never happened because the attacker did not log in at all. They presented an existing token that Drift had already been given permission to use. MFA had no role to play because no password was entered. Once inside, UNC6395 pulled data and searched it for credentials like AWS keys, Snowflake tokens, and passwords. Cloudflare, PagerDuty, and dozens of others were caught up in it.

The takeaway is not that Drift was a bad app. The takeaway is that a trustworthy app at installation can become a risk later if its credentials get stolen. Your security tools need to watch what connected apps are doing over time, not just what permissions they asked for on day one.

Why Most Security Tools Miss This

Most OAuth security tools do their work at the moment an app is connected. They check whether the permissions requested seem excessive. They flag apps from unknown vendors. That is genuinely useful, and you should be doing it. But it is not enough on its own.

A well-known, trusted app with reasonable permissions would pass those checks easily. If that app’s credentials get stolen six months later, your installation-time review catches nothing. The risk came after the fact.

What good OAuth monitoring actually includes

  • Watching app behavior over time, not just at setup. Sudden spikes in data access, queries at unusual hours, or requests for data types the app normally ignores are all worth flagging. Static permission reviews never see those patterns.
  • Understanding whose account is connected. A token tied to an executive’s inbox full of sensitive contracts carries a lot more risk than the same token tied to a new hire’s account. Your monitoring needs to factor in what the connected account can actually reach.
  • Responding at the right speed. A clearly malicious app with no known vendor and unusual behavior from day one warrants immediate action. A trusted integration showing a small anomaly warrants a human review first. Your response process needs to tell those two situations apart.

OAuth Was Built for a Simpler Time

When OAuth was designed, the typical use case was a small number of IT-approved apps getting limited access to shared calendars. That was a manageable situation. Today, every employee independently connects AI tools, note-taking apps, automation platforms, and productivity add-ons to their work accounts. Each connection creates a token. None of those tokens expire automatically. Most organizations don’t know how many they have.

As AI tools become standard in the workplace, the number of OAuth connections in your environment will grow. Blocking employees from using AI tools entirely is not realistic, and it would not have stopped the Drift attack anyway since that started with a trusted, approved integration.

What You Can Do Right Now

Start by pulling a list of every OAuth app connected to your Google Workspace or Microsoft 365 environment. Both platforms let admins do this without any third-party tools. Look for apps you don’t recognize, apps connected to accounts of people who have left, and apps with very broad permissions like “read all mail” or “access all files.” Those are your first priorities to review and revoke.

From there, build a habit of reviewing OAuth grants quarterly. It takes less time than you think once you’ve done the initial cleanup, and it keeps the list from getting out of hand again. When employees leave, include OAuth revocation in your offboarding checklist alongside password resets and account deactivation.


Google and Microsoft Help:

Google Workspace Admin Console tokens:

admin.google.com → Users → [User] → Security → Connected Applications

Microsoft Entra permissions review:

learn.microsoft.com/en-us/entra/identity/enterprise-apps/manage-application-permissions


Sources:


Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

OAuth tokens don't expire when employees leave, passwords change, or apps go rogue. Your security program needs...

Read more
Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more
Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Article Updates: As of May 6th 2026, every major U.S. AI lab, including Google DeepMind, Microsoft, xAI,...

Read more