'$15K bill destroyed a solo developer’s startup': How hackers are using leaked Google API keys to ‘go wild’ with Gemini AI for free

5 hours ago 7
Frustrated Computer User (Image credit: Shutterstock)

  • Exposed Google API keys allow attackers to run unlimited Gemini AI requests
  • Developers experience severe financial losses due to unauthorized access to AI infrastructure
  • Hardcoded credentials elevate public identifiers into active authentication tokens for Gemini AI

Developers are facing severe consequences as exposed Google API keys are exploited to access Gemini AI without authorization, leading to significant financial losses, experts have warned.

Security researchers from CloudSek found the root cause of these incidents lies in the unintended elevation of publicly available API keys into live Gemini AI credentials.

Many developers have long embedded keys for services like Maps or Firebase in public-facing applications, following Google’s official guidance - never anticipating these keys would gain access to the AI infrastructure.

Article continues below

Elevation of publicly available API keys is the root cause

One case involved a solo developer whose startup nearly collapsed after an attacker used a publicly accessible key to flood Gemini AI with inference requests.

The developer revoked the key within minutes of receiving a billing alert, yet due to a reporting lag in Google Cloud’s billing system, the charges had already reached $15,400.

Similarly, a Japanese company experienced approximately $128,000 in unauthorized Gemini API usage, despite firewall-level IP restrictions.

Also, a small development team in Mexico saw an $82,314 spike in only 48 hours, a dramatic 455-times increase over typical spending.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

“This issue does not stem from developer negligence; the implementations were compliant with Google’s prescribed guidelines,” said Tuhin Bose, cybersecurity researcher at CloudSEK.

He explained the architecture effectively converted non-sensitive identifiers into authentication tokens, creating a systemic vulnerability across numerous applications.

CloudSEK’s research identified 32 exposed Google API keys across 22 Android applications with a combined install base exceeding 500 million users.

The affected apps include household names such as OYO Hotel Booking App, Google Pay for Business, Taobao, and ELSA Speak.

Researchers confirmed data exposure in ELSA Speak when they accessed user-submitted audio files via the Gemini Files API.

The vulnerability allows attackers to perform unlimited Gemini API calls, access sensitive user data, and exhaust organizational API quotas.

It can also persist through app update cycles, severely impacting both developers and end users.

Developers who had followed Google’s guidance now unknowingly hold live credentials to powerful AI tools without notification or opt-in prompts.

Technical measures such as revoking keys and restricting project permissions can mitigate exposure.

However, the financial and operational impact on developers is substantial, suggesting that current practices for handling API keys and AI integrations require immediate reevaluation.

Exposure of hardcoded credentials demonstrates the risks inherent in assuming backward compatibility for modern AI-enabled cloud services.


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read Entire Article