Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Vulnerability Let Attackers Access Any Google User Phone Number

Google Vulnerability Let Attackers Access Any Google User Phone Number

Posted on June 10, 2025June 10, 2025 By CWS

A crucial safety vulnerability in Google’s account restoration system allowed malicious actors to acquire the telephone numbers of any Google person by way of a complicated brute-force assault, in accordance with a disclosure by a BruteCat safety researcher revealed this week.

The vulnerability, which has since been patched, exploited Google’s No-JavaScript username restoration kind to bypass safety protections and extract delicate private data.

The vulnerability centered on Google’s legacy username restoration system that functioned with out JavaScript enabled. A safety researcher found that this forgotten endpoint might be manipulated to confirm whether or not particular telephone numbers have been related to specific show names, creating a chance for systematic telephone quantity enumeration.

Account restoration

The assault methodology concerned three key steps: first, acquiring a goal’s Google account show identify by way of Looker Studio by transferring doc possession, which might leak the sufferer’s identify with none interplay required.

Second, initiating Google’s forgot password movement to retrieve a masked telephone quantity trace, displaying solely the previous couple of digits. Lastly, utilizing a custom-built device known as “gpb” to brute-force the whole telephone quantity by testing mixtures in opposition to the identified show identify, reads the BruteCat report.

Vulnerability Leaks Customers’ Telephone Numbers

The researcher overcame Google’s rate-limiting protections by way of intelligent technical workarounds. By using IPv6 handle ranges offering over 18 quintillion distinctive IP addresses, the assault might rotate by way of totally different addresses for every request, successfully bypassing Google’s anti-abuse mechanisms.

Moreover, the researcher found that botguard tokens from JavaScript-enabled kinds might be repurposed for the No-JS model, eliminating captcha challenges that may in any other case stop automated assaults.

The assault proved remarkably environment friendly, with the researcher reaching roughly 40,000 verification makes an attempt per second utilizing a modest $0.30/hour server.

Relying on the nation code, full telephone numbers might be extracted in timeframes starting from mere seconds for smaller nations like Singapore to round 20 minutes for the US.

Google was notified of the vulnerability on April 14, 2025, and responded rapidly by implementing non permanent mitigations whereas working towards a everlasting resolution.

The corporate absolutely deprecated the susceptible No-JS username restoration kind by June 6, 2025, successfully eliminating the assault vector.

Google acknowledged the severity of the invention, initially awarding $1,337 earlier than rising the bounty to $5,000 after the researcher appealed, citing the assault’s lack of stipulations and undetectable nature.

This incident highlights the continuing safety challenges posed by legacy techniques and the significance of complete safety audits throughout all service endpoints, even these seemingly out of date or hardly ever used.

Velocity up and enrich risk investigations with Menace Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Access, Attackers, Google, Number, Phone, User, Vulnerability

Post navigation

Previous Post: Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline Operations
Next Post: CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog

Related Posts

Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Bitter Malware Using Custom-Developed Tools To Evade Detection In Sophisticated Attacks Cyber Security News
Malware Exploits AI Systems for Data Theft and Remote Access Malware Exploits AI Systems for Data Theft and Remote Access Cyber Security News
New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools Cyber Security News
Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges Windows Cloud Files Mini Filter Driver 0-Day Vulnerability Exploited in the Wild to Escalate Privileges Cyber Security News
1.2 Million Healthcare Devices and Systems Data Leaked Online 1.2 Million Healthcare Devices and Systems Data Leaked Online Cyber Security News
Critical Android 0-Click Vulnerability in System Component Allows RCE Attacks Critical Android 0-Click Vulnerability in System Component Allows RCE Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark