Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Vulnerability Let Attackers Access Any Google User Phone Number

Google Vulnerability Let Attackers Access Any Google User Phone Number

Posted on June 10, 2025June 10, 2025 By CWS

A crucial safety vulnerability in Google’s account restoration system allowed malicious actors to acquire the telephone numbers of any Google person by way of a complicated brute-force assault, in accordance with a disclosure by a BruteCat safety researcher revealed this week.

The vulnerability, which has since been patched, exploited Google’s No-JavaScript username restoration kind to bypass safety protections and extract delicate private data.

The vulnerability centered on Google’s legacy username restoration system that functioned with out JavaScript enabled. A safety researcher found that this forgotten endpoint might be manipulated to confirm whether or not particular telephone numbers have been related to specific show names, creating a chance for systematic telephone quantity enumeration.

Account restoration

The assault methodology concerned three key steps: first, acquiring a goal’s Google account show identify by way of Looker Studio by transferring doc possession, which might leak the sufferer’s identify with none interplay required.

Second, initiating Google’s forgot password movement to retrieve a masked telephone quantity trace, displaying solely the previous couple of digits. Lastly, utilizing a custom-built device known as “gpb” to brute-force the whole telephone quantity by testing mixtures in opposition to the identified show identify, reads the BruteCat report.

Vulnerability Leaks Customers’ Telephone Numbers

The researcher overcame Google’s rate-limiting protections by way of intelligent technical workarounds. By using IPv6 handle ranges offering over 18 quintillion distinctive IP addresses, the assault might rotate by way of totally different addresses for every request, successfully bypassing Google’s anti-abuse mechanisms.

Moreover, the researcher found that botguard tokens from JavaScript-enabled kinds might be repurposed for the No-JS model, eliminating captcha challenges that may in any other case stop automated assaults.

The assault proved remarkably environment friendly, with the researcher reaching roughly 40,000 verification makes an attempt per second utilizing a modest $0.30/hour server.

Relying on the nation code, full telephone numbers might be extracted in timeframes starting from mere seconds for smaller nations like Singapore to round 20 minutes for the US.

Google was notified of the vulnerability on April 14, 2025, and responded rapidly by implementing non permanent mitigations whereas working towards a everlasting resolution.

The corporate absolutely deprecated the susceptible No-JS username restoration kind by June 6, 2025, successfully eliminating the assault vector.

Google acknowledged the severity of the invention, initially awarding $1,337 earlier than rising the bounty to $5,000 after the researcher appealed, citing the assault’s lack of stipulations and undetectable nature.

This incident highlights the continuing safety challenges posed by legacy techniques and the significance of complete safety audits throughout all service endpoints, even these seemingly out of date or hardly ever used.

Velocity up and enrich risk investigations with Menace Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Access, Attackers, Google, Number, Phone, User, Vulnerability

Post navigation

Previous Post: Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline Operations
Next Post: CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog

Related Posts

Crimson Collective Claims to have Disconnected Many Brightspeed Home Internet Users Crimson Collective Claims to have Disconnected Many Brightspeed Home Internet Users Cyber Security News
AI Security Frameworks – Ensuring Trust in Machine Learning AI Security Frameworks – Ensuring Trust in Machine Learning Cyber Security News
Windows 11 Update Enhances AI and User Interface Windows 11 Update Enhances AI and User Interface Cyber Security News
Flickr Security Breach Exposes User Data Flickr Security Breach Exposes User Data Cyber Security News
ASP.NET Developers Targeted by Malicious NuGet Packages ASP.NET Developers Targeted by Malicious NuGet Packages Cyber Security News
Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark