Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeThreat LibraryData Breaches
Google+

Google+ Data Breach

Published: 11/14/2025

Written by: Lizzie Danielson

Glitch effectGlitch effect

The Google+ data breach was a significant cybersecurity incident that exposed sensitive user data from the now-defunct social media platform. Discovered in 2018, the breach impacted hundreds of thousands of user profiles, including personal information such as names, email addresses, occupations, and more. This incident highlighted the importance of proper vulnerability management and led to the expedited shutdown of Google+.

Google+ data breach explained: what happened?

The Google+ data breach was uncovered in March 2018 as part of an internal security audit. A vulnerability in the platform’s People API allowed unauthorized access to non-public user profile data. Although no evidence was found to indicate malicious exploitation, Google disclosed that up to 500,000 accounts may have been affected by the exposure.

When did the Google+ data breach happen?

Google identified the vulnerability in March 2018. However, the breach was not publicly disclosed until October 2018 when a Wall Street Journal report drew attention to the company’s delayed acknowledgment.

Who hacked Google+?

The identities and motivations behind the Google+ breach remain unknown since there’s no concrete evidence suggesting malicious actors actively exploited the vulnerability.

How did the Google+ Breach happen?

The breach occurred due to a software vulnerability in the Google+ People API. This flaw allowed third-party applications to access private user data without proper authorization, even when users had restricted the data visibility.

Google+ Data Breach Timeline

  • March 2018: Google discovered the API vulnerability during an internal audit.

  • October 2018: The Wall Street Journal reported Google’s delayed response, leading to public disclosure.

  • April 2019: Google+ was permanently shut down.

Technical Details

The flaw resided in the Google+ People API, which permitted unauthorized third-party applications to scrape private profile information. While Google fixed the vulnerability upon discovery, the incident revealed gaps in API security and auditing practices.

Indicators of Compromise (IoCs)

No specific IoCs were made public, as Google reported no evidence that the vulnerability had been actively exploited by attackers.

Forensic and Incident Investigation

Google conducted an internal security audit that revealed the API vulnerability. While the company claimed no malicious exploitation occurred, the failure to disclose sooner prompted scrutiny regarding transparency and accountability in breach responses.

Data Breach Guide

Our data breach guide breaks down how breaches happen, what they really cost, and, most importantly, how you can stop them from gutting your business.

Read the Data Breach Guideright arrow

What data was compromised in the Google+ breach?

The breach exposed non-public profile data, including names, email addresses, birth dates, occupations, and account details. Crucially, no passwords, financial information, or sensitive authentication data were compromised.

How many users were affected by the Google+ data breach?

It is estimated that data from up to 500,000 Google+ user profiles was exposed. However, due to limited logging and visibility, the exact number of affected users remains uncertain.

Was my data exposed in the Google+ breach?

While there was no official lookup tool provided, Google issued notifications to affected users whose data may have been exposed.

Key impacts of the Google+ breach

The Google+ breach contributed to significant reputational damage for Google, particularly in how it delayed disclosure. It accelerated the shutdown of Google+ and raised questions regarding data security practices for large tech organizations.

Response to the Google+ data breach

Google patched the vulnerability shortly after its discovery in March 2018. However, the company faced backlash for waiting months to inform the public. To mitigate further risks, Google announced an expedited shutdown of the Google+ platform in October 2018.

Lessons from the Google+ data breach

  • Transparency is critical. Prompt communication about breaches fosters trust and credibility with users.

  • Routine security audits matter. Proactively identifying weaknesses helps prevent unauthorized data access.

  • Strengthen API security. Securing APIs with strict access controls can minimize unnecessary data exposure.

Is Google+ safe after the breach?

Google+ is no longer operational, as the platform was permanently shut down in April 2019. However, the breach serves as a cautionary tale for safeguarding user data in online platforms.

Mitigation & prevention strategies

  • Implement strong access controls for APIs to reduce unauthorized data exposure.

  • Regularly audit systems and applications to detect vulnerabilities.

  • Practice transparent and timely communication in case of a security incident.

  • Encourage multi-factor authentication (MFA) and robust patch management to enhance cybersecurity resilience.

Related data breach incidents

  • Snowflake

  • Equifax

  • Facebook

Related educational articles & videos

  • Ransomware Guide

  • Breaking down Ransomware Attacks and How to Stay Ahead

  • Before Ransomware Strikes: Attack Playbook EBook


FAQs

The breach occurred due to a vulnerability in the Google+ People API, which allowed unauthorized access to private user data by third-party apps.

The breach exposed non-public profile data, such as names, email addresses, occupations, and birth dates. No passwords or financial information was compromised.

There’s no evidence indicating that malicious actors exploited the breach. It primarily stemmed from an internal vulnerability in the platform’s People API.

Businesses should implement strong API security measures, conduct regular system audits, and practice timely disclosure in case of any breach.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy