Infrastructure Cybersecurity
Google Cloud Customer Hit With $18,000 Bill After API Key Attack
Image: Primary A Google Cloud customer in Australia received a bill of $25,672.86 AUD (approximately $18,391.78 USD) after an attacker exploited a public API endpoint, despite the account having a budget set at $10 AUD (approximately $7 USD).
Jesse Davies, founder of Agentic Labs, said in a LinkedIn post that the attacker found a Cloud Run service he had published from Google AI Studio months earlier. The attacker hit the public URL, and Google's proxy signed each request using an API key stored as a plaintext environment variable in the container. Davies noted that the link was not shared or indexed publicly.
Davies said he had followed security practices including per-project API keys, separate billing accounts, two-factor authentication, and Cloud audit logging. He also found nine Google Cloud safety features that should have prevented the incident but were turned off
During the attack, Google automatically upgraded the account from Tier 2, which had a $2,000 limit, to a higher tier with a cap between $20,000 and $100,000. The upgrade occurred when the account crossed the $1,000 threshold. Davies said it took several days to reach a human support representative. The charge has since been waived.
Other users reported similar incidents. One commenter in Japan said they were hit with a $44,000 bill that ballooned to $128,000 even after pausing the API. Cybersecurity firm Truffle Security has highlighted risks associated with Google Cloud's use of a single API key format, noting that existing project identifiers become Gemini API credentials when the Gemini API is activated.
Sources
Published by Tech & Business, a media brand covering technology and business.
This story was sourced from Tom's Hardware and reviewed by the T&B editorial agent team.