Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vulnerabilities Exposed Phone Number of Any Google User

Posted on June 10, 2025June 10, 2025 By CWS

Google just lately patched a collection of vulnerabilities that would have been exploited to acquire the cellphone variety of any person. 

Particulars of the exploit had been made public on Monday by the Singapore-based researcher who reported it to the tech large. 

The researcher, who makes use of the web monikers Brutecat and Cranium, stated he got here throughout the vulnerabilities after disabling JavaScript in his browser in an effort to find out whether or not any Google companies nonetheless labored with out JavaScript. 

He discovered that account restoration types nonetheless labored, they usually additionally allowed him to verify — utilizing two HTTP requests — whether or not a restoration e-mail tackle or cellphone quantity was related to a specified account show identify. 

Additional assessments confirmed that he might additionally get hold of the precise cellphone quantity related to a specified show identify by a brute-force assault. Google’s charge limiting protections had been bypassed by utilizing totally different IPv6 addresses for every request and a BotGuard token obtained from Google.

As a way to leverage this for a sensible exploit that may allow him to acquire any person’s cellphone quantity, the researcher additionally wanted a method to get hold of the show identify related to a given Gmail tackle. 

He achieved this by abusing a Google service named Looker Studio, designed for changing information into reviews and dashboards. Making a Looker Studio doc and transferring its possession to the focused person’s e-mail tackle would consequence within the sufferer’s show identify being proven.

When all of this was put collectively, an attacker who knew the focused person’s e-mail tackle might have leveraged Looker Studio to acquire their show identify, which might then be used by the password restoration web page to acquire a masked cellphone quantity (final two digits), which might then be brute-forced to acquire the complete cellphone quantity.Commercial. Scroll to proceed studying.

Cellphone numbers could also be thought-about extremely delicate info, typically being focused in social engineering and different kinds of assaults. 

The researcher has created a video exhibiting the exploit in motion:

In response to assessments performed by Brutecat, a US cellphone quantity might have been obtained in roughly 20 minutes, a UK quantity in 4 minutes, and Netherlands and Singapore numbers might be brute-forced in seconds — all of this by renting a server at a price of $0.30/hour.

Google was knowledgeable concerning the vulnerabilities in mid-April and rolled out mitigations in Could and early June. The tech large awarded Brutecat a $5,000 bug bounty for his findings.

In March, the researcher disclosed the main points of a YouTube vulnerability that uncovered the e-mail addresses of content material creators, for which he earned a $20,000 bug bounty.

Associated: HPE Patches Crucial Vulnerability in StoreOnce

Associated: Google Researchers Discover New Chrome Zero-Day

Associated: Vulnerabilities in CISA KEV Are Not Equally Crucial

Security Week News Tags:Exposed, Google, Number, Phone, User, Vulnerabilities

Post navigation

Previous Post: SAP June 2025 Patch Day
Next Post: Exploited Vulnerability Impacts Over 80,000 Roundcube Servers

Related Posts

Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal Security Week News
Prison Sentence for Man Involved in SEC X Account Hack Security Week News
Hackers Stole 300,000 Crash Reports From Texas Department of Transportation Security Week News
Ransomware Attack Forces Kettering Health to Cancel Procedures Security Week News
FBI Aware of 900 Organizations Hit by Play Ransomware Security Week News
CloudSEK Raises $19 Million for Threat Intelligence Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover
  • The AI Arms Race: Deepfake Generation vs. Detection
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior
  • OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover
  • The AI Arms Race: Deepfake Generation vs. Detection
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Hirundo Raises $8 Million to Eliminate AI’s Bad Behavior
  • OneLogin AD Connector Vulnerabilities Exposes Authentication Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News