The Register® — Biting the hand that feeds IT

Feeds

Google tools gaffe let ZOMBIE web admins feast on websites

Dead accounts resurrected to cause merry hell

Supercharge your infrastructure

Google potentially allowed former web admins to drive corporate websites off a cliff by resurrecting deleted accounts for its webmaster tools service.

Google Webmaster Tools accounts can be used by anyone to manage their websites, from checking the indexing of pages to fine-tuning their visibility in the dominant search engine. Google's glitch, which revived old or disabled accounts and granted them permission to make alterations, was first noted by search-engine optimisation blogger Dave Naylor.

Although the tools are free to use, they have become quite powerful over the years, and can help make or break a site in terms of visitor numbers. Unauthorised access to the service could be used for all sorts of mischief, Naylor warned:

Webmaster Tools is so much more powerful than it ever was there is a serious risk that damage could be caused to sites by people who no longer have permission to make changes. Things like disavow link lists, de-index urls or the entire site, redirect urls, geolocation alterations… a whole world of pain.

The blunder also opened up access to Google Analytics, allowing ex-employees or contractors to spy on their former employers, Search Engine Journal added.

Fortunately Google resolved the screw-up, according to a statement issued to Searchengineland.com on Wednesday:

For several hours yesterday a small set of Webmaster Tools accounts were incorrectly re-verified for people who previously had access. We’ve reverted these accounts and are investigating ways to prevent this issue from recurring.

The cause of the breach remains unclear. We've put in a query to Google and will update this story if we hear more. ®

5 ways to prepare your advertising infrastructure for disaster

Whitepapers

5 ways to prepare your advertising infrastructure for disaster
Being prepared allows your brand to greatly improve your advertising infrastructure performance and reliability that, in the end, will boost confidence in your brand.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Email delivery: Hate phishing emails? You'll love DMARC
DMARC has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name..
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Email delivery: 4 steps to get more email to the inbox
This whitepaper lists some steps and information that will give you the best opportunity to achieve an amazing sender reputation.

More from The Register

next story
Chaos Computer Club: iPhone 5S finger-sniffer COMPROMISED
Anyone can touch your phone and make it give up its all
NSA in new SHOCK 'can see public data' SCANDAL!
What you say on Twitter doesn't stay on Twitter
Hundreds of hackers sought for new £500m UK cyber-bomber strike force
Britain must rm -rf its enemies or be rm -rf'ed, declares defence secretary
Would you hire a hacker to run your security? 'Yes' say Brit IT bosses
We don't have enough securo bods in the industry either, reckon gloomy BOFHs
UK's Get Safe Online? 'No one cares' - run the blockbuster ads instead
Something like Jack Bauer's 24 ... whatever it'll take to teach kids how to bat away hackers
London schoolboy cuffed for BIGGEST DDOS ATTACK IN HISTORY
Bet his parents wish he'd been playing computer games
RSA: That NSA crypto-algorithm we put in our products? Stop using that
Encryption key tool was dodgy in 2007, and still dodgy now
The NSA's hiring - and they want a CIVIL LIBERTIES officer
In other news, the Spanish Inquisition want an equal opprtunities officer
'Occupy' affiliate claims Intel bakes SECRET 3G radio into vPro CPUs
Tinfoil hat brigade say every PC is on mobile networks, even when powered down
prev story