Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Vulnerabilities Exposed Phone Number of Any Google User

Vulnerabilities Exposed Phone Number of Any Google User

Posted on June 10, 2025June 10, 2025 By CWS

Google just lately patched a collection of vulnerabilities that would have been exploited to acquire the cellphone variety of any person. 

Particulars of the exploit had been made public on Monday by the Singapore-based researcher who reported it to the tech large. 

The researcher, who makes use of the web monikers Brutecat and Cranium, stated he got here throughout the vulnerabilities after disabling JavaScript in his browser in an effort to find out whether or not any Google companies nonetheless labored with out JavaScript. 

He discovered that account restoration types nonetheless labored, they usually additionally allowed him to verify — utilizing two HTTP requests — whether or not a restoration e-mail tackle or cellphone quantity was related to a specified account show identify. 

Additional assessments confirmed that he might additionally get hold of the precise cellphone quantity related to a specified show identify by a brute-force assault. Google’s charge limiting protections had been bypassed by utilizing totally different IPv6 addresses for every request and a BotGuard token obtained from Google.

As a way to leverage this for a sensible exploit that may allow him to acquire any person’s cellphone quantity, the researcher additionally wanted a method to get hold of the show identify related to a given Gmail tackle. 

He achieved this by abusing a Google service named Looker Studio, designed for changing information into reviews and dashboards. Making a Looker Studio doc and transferring its possession to the focused person’s e-mail tackle would consequence within the sufferer’s show identify being proven.

When all of this was put collectively, an attacker who knew the focused person’s e-mail tackle might have leveraged Looker Studio to acquire their show identify, which might then be used by the password restoration web page to acquire a masked cellphone quantity (final two digits), which might then be brute-forced to acquire the complete cellphone quantity.Commercial. Scroll to proceed studying.

Cellphone numbers could also be thought-about extremely delicate info, typically being focused in social engineering and different kinds of assaults. 

The researcher has created a video exhibiting the exploit in motion:

In response to assessments performed by Brutecat, a US cellphone quantity might have been obtained in roughly 20 minutes, a UK quantity in 4 minutes, and Netherlands and Singapore numbers might be brute-forced in seconds — all of this by renting a server at a price of $0.30/hour.

Google was knowledgeable concerning the vulnerabilities in mid-April and rolled out mitigations in Could and early June. The tech large awarded Brutecat a $5,000 bug bounty for his findings.

In March, the researcher disclosed the main points of a YouTube vulnerability that uncovered the e-mail addresses of content material creators, for which he earned a $20,000 bug bounty.

Associated: HPE Patches Crucial Vulnerability in StoreOnce

Associated: Google Researchers Discover New Chrome Zero-Day

Associated: Vulnerabilities in CISA KEV Are Not Equally Crucial

Security Week News Tags:Exposed, Google, Number, Phone, User, Vulnerabilities

Post navigation

Previous Post: SAP June 2025 Patch Day
Next Post: Exploited Vulnerability Impacts Over 80,000 Roundcube Servers

Related Posts

Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site Nearly 30 Alleged Victims of Oracle EBS Hack Named on Cl0p Ransomware Site Security Week News
Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Critical Vulnerabilities Patched in Trend Micro Apex Central, Endpoint Encryption Security Week News
M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal Security Week News
Who’s Really Behind the Mask? Combatting Identity Fraud Who’s Really Behind the Mask? Combatting Identity Fraud Security Week News
Coinbase Rejects M Ransom After Rogue Contractors Bribed to Leak Customer Data Coinbase Rejects $20M Ransom After Rogue Contractors Bribed to Leak Customer Data Security Week News
Artemis Unveils with M Funding Boost Artemis Unveils with $70M Funding Boost Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark