Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vulnerabilities Exposed Phone Number of Any Google User

Posted on June 10, 2025June 10, 2025 By CWS

Google just lately patched a collection of vulnerabilities that would have been exploited to acquire the cellphone variety of any person. 

Particulars of the exploit had been made public on Monday by the Singapore-based researcher who reported it to the tech large. 

The researcher, who makes use of the web monikers Brutecat and Cranium, stated he got here throughout the vulnerabilities after disabling JavaScript in his browser in an effort to find out whether or not any Google companies nonetheless labored with out JavaScript. 

He discovered that account restoration types nonetheless labored, they usually additionally allowed him to verify — utilizing two HTTP requests — whether or not a restoration e-mail tackle or cellphone quantity was related to a specified account show identify. 

Additional assessments confirmed that he might additionally get hold of the precise cellphone quantity related to a specified show identify by a brute-force assault. Google’s charge limiting protections had been bypassed by utilizing totally different IPv6 addresses for every request and a BotGuard token obtained from Google.

As a way to leverage this for a sensible exploit that may allow him to acquire any person’s cellphone quantity, the researcher additionally wanted a method to get hold of the show identify related to a given Gmail tackle. 

He achieved this by abusing a Google service named Looker Studio, designed for changing information into reviews and dashboards. Making a Looker Studio doc and transferring its possession to the focused person’s e-mail tackle would consequence within the sufferer’s show identify being proven.

When all of this was put collectively, an attacker who knew the focused person’s e-mail tackle might have leveraged Looker Studio to acquire their show identify, which might then be used by the password restoration web page to acquire a masked cellphone quantity (final two digits), which might then be brute-forced to acquire the complete cellphone quantity.Commercial. Scroll to proceed studying.

Cellphone numbers could also be thought-about extremely delicate info, typically being focused in social engineering and different kinds of assaults. 

The researcher has created a video exhibiting the exploit in motion:

In response to assessments performed by Brutecat, a US cellphone quantity might have been obtained in roughly 20 minutes, a UK quantity in 4 minutes, and Netherlands and Singapore numbers might be brute-forced in seconds — all of this by renting a server at a price of $0.30/hour.

Google was knowledgeable concerning the vulnerabilities in mid-April and rolled out mitigations in Could and early June. The tech large awarded Brutecat a $5,000 bug bounty for his findings.

In March, the researcher disclosed the main points of a YouTube vulnerability that uncovered the e-mail addresses of content material creators, for which he earned a $20,000 bug bounty.

Associated: HPE Patches Crucial Vulnerability in StoreOnce

Associated: Google Researchers Discover New Chrome Zero-Day

Associated: Vulnerabilities in CISA KEV Are Not Equally Crucial

Security Week News Tags:Exposed, Google, Number, Phone, User, Vulnerabilities

Post navigation

Previous Post: SAP June 2025 Patch Day
Next Post: Exploited Vulnerability Impacts Over 80,000 Roundcube Servers

Related Posts

Transportation Companies Hacked to Steal Cargo Security Week News
CrowdStrike to Acquire Onum to Fuel Falcon Next-Gen SIEM With Real-Time Telemetry Security Week News
CISA Closes 10 Emergency Directives as Vulnerability Catalog Takes Over Security Week News
Malicious NPM Packages Target Cursor AI’s macOS Users Security Week News
Forminator WordPress Plugin Vulnerability Exposes 400,000 Websites to Takeover Security Week News
Chrome, Edge Extensions Caught Tracking Users, Creating Backdoors Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities
  • Autonomous AI Agents Are Becoming the New Operating System of Cybercrime
  • Cyber Insights 2026: Malware and Cyberattacks in the Age of AI
  • Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Over 1,400 MongoDB Databases Ransacked by Threat Actor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Default ICS Credentials Exploited in Destructive Attack on Polish Energy Facilities
  • Autonomous AI Agents Are Becoming the New Operating System of Cybercrime
  • Cyber Insights 2026: Malware and Cyberattacks in the Age of AI
  • Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
  • Over 1,400 MongoDB Databases Ransacked by Threat Actor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark