Close Menu
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

CUBE Acquires 4CRisk.ai: Elevating AI Compliance and Risk Automation

February 23, 2026

Empowering the Agentic Endpoint

February 22, 2026

Cybersecurity Weekly: Major Breaches, Zero-Days, and Exploits

February 22, 2026
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cybercrime and Ransomware
  • Emerging Tech
  • Threat Intelligence
  • Expert Insights
  • Careers and Learning
  • Compliance
Home » Google Bug Allowed Brute-Forcing of Any User Phone Number
Uncategorized

Google Bug Allowed Brute-Forcing of Any User Phone Number

Staff WriterBy Staff WriterJune 11, 2025No Comments5 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


Google has fixed a security vulnerability in its page for recovering account details that allowed anyone to access the page and brute-force the private phone number of any user. The flaw posed a significant risk to Google users by exposing them to risk of phishing and other attacks.

A security researcher who goes by the online name of Brutecat detailed on their website how the page for recovering one’s password worked without JavaScript. This meant that it also lacked protection from BotGuard, a cloud-based cybersecurity offering designed to protect websites and Web applications from malicious bots, automated attacks, crawlers, and scrapers.

“This surprised me, as I used to think these account recovery forms required JavaScript since 2018 as they relied on BotGuard solutions generated from heavily obfuscated, proof-of-work JavaScript code for anti-abuse,” Brutecat wrote in a post detailing the discovery.

BotGuard won’t work on websites without JavaScript because many of its advanced detection techniques rely on executing JavaScript in the visitor’s browser to gather client-side data, researcher Pieter Arntz from Malwarebytes explained in a post analyzing the flaw.

“If a website does not serve JavaScript, or if a user or bot disables JavaScript, BotGuard cannot collect the necessary information for fingerprinting or behavioral analysis,” he wrote.

Related:Mirai Botnets Exploit Flaw in Wazuh Security Platform

Brutecat informed Google of the flaw, and it has since been fixed; the researcher was awarded $5,000 through Google’s bug-bounty program for the discovery.

How the Brute-Force Google Flaw Worked

Since BotGuard was not in effect on the password-recovery page, Brutecat was able to craft two HTTP POST requests to check if a recovery email or phone number was associated with a specific display name. The first provided an “ess” value tied to the recovery phone number that could be used for the next HTTP request.

The second request allowed Brutecat to check if a Google account exists with that phone number as well as the display name, with the response coming back that an account was found. The researcher then tried to brute-force entry into the account using the phone number on the recovery page but came up empty due to a rate limit on their IP address and the arrival of CAPTCHAs after a few requests.

The researcher then had the idea to use a proxy as well as IPv6, rotating the IP address used for every request to bypass the rate limit, and developed a proof-of-concept (PoC); however, they always ran into CAPTCHAs as a roadblock to brute-forcing the person’s account details.

Related:Stealth Falcon APT Exploits Microsoft RCE Zero-Day in Mideast

‎Eventually, Brutecat developed a way around the roadblocks by replacing js_disabled with the BotGuard token from the JavaScript-enabled password-request form. “The Botguard token seemed to have no request limit on the No-JS form,” Brutecat explained.

Final Tweaks Led to Success

This paved the way for the PoC work, but the researcher had to make a few more tweaks to address issues such as finding country codes for a victim’s phone number and discovering the victim’s Google account display name.

“Brutecat also had to use rotating IP addresses and a trick to bypass the occasional CAPTCHAs but was able to manage 40K requests per second,” Artnz explained in the Malwarebytes post. “At that rate, if the attacker knew the country code of the phone number, it would take about 20 minutes in the US to find out the recovery phone number. In the UK that would come down to 4 minutes because they have shorter phone numbers.”

To acquire the full display name of the account, Brutecat discovered a method to leak Google account display names by exploiting a feature in Looker Studio, formerly Google Data Studio, Artnz went on to explain. The researcher did this by making a report/document in Google’s Looker Studio tool, then changing the document’s owner to the victim’s Google account, using the victim’s email address.

Related:United Natural Food’s Operations Limp Through Cybersecurity Incident

“After transferring ownership, the victim’s full name automatically appeared on the Looker Studio home page’s ‘Recent documents’ list even if the victim never opened the document, interacted with it, or knew about it,” Artnz explained. “The key to this was finding that Looker Studio’s interface still displayed names for document transfers without requiring any action from the victim, unlike other Google services that now require prior interaction.”

Mitigation & Potential Impact

Brutecat sent a report about the flaw to Google on April 14 and received an immediate response, with Google acknowledging by April 25 that it was a good catch and the flaw did indeed exist. By June 6, the flaw was completely mitigated. Google fixed the flaw by fully deprecating the No-JS username recovery form to endpoints worldwide, according to Brutecat.

“We’ve always stressed the importance of working with the security research community through our vulnerability rewards program and we want to thank the researcher for flagging this issue,” Google said in an emailed statement. “Researcher submissions like this are one of the many ways we’re able to quickly find and fix issues for the safety of our users.”

At this time, the company does not believe that the flaw has ever been exploited. However, such a weakness in Google’s password-recovery form would have posed a significant threat to users if it had been exploited, exposing them to various phishing and other attacks, according to Malwarebytes. Indeed, having someone’s personal number and other private details about them is especially helpful for socially engineered vishing attacks that initiate with phone calls.

“Allowing an attacker to trace phone numbers to Google accounts like this creates a massive risk for phishing and SIM-swapping attacks — especially since the majority of users will have their primary phone number as their account recovery number,” Artnz wrote.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWindows WebDav Zero-Day: Hackers Unleash Malware Attack
Next Article Swimlane Nears Profitability, Raises $45M in New Fundin
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

September 19, 2025

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025
Leave A Reply Cancel Reply

Latest Posts

Cybersecurity Weekly: Major Breaches, Zero-Days, and Exploits

February 22, 2026

Revolutionizing ICS Security: The Power of OT Deception in Active Defense

February 22, 2026

Multiple Hacking Groups Exploit OpenClaw to Steal API Keys and Deploy Malware

February 22, 2026

Global Outage: 6-Hour Cloudflare Service Collapse Leaves Customers Unreachable

February 22, 2026
Don't Miss

RiskRubric.ai Unveils Groundbreaking AI Model Risk Leaderboard

By Staff WriterSeptember 19, 2025

Essential Insights Launch of RiskRubric.ai: The Cloud Security Alliance and partners have introduced RiskRubric.ai, the…

RegScale Secures $30M+ to Transform Cyber GRC

September 19, 2025

Cybersecurity Leaders Brace for Surge in Nation-State Attacks by 2025

September 19, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Recent Posts

  • CUBE Acquires 4CRisk.ai: Elevating AI Compliance and Risk Automation
  • Empowering the Agentic Endpoint
  • Cybersecurity Weekly: Major Breaches, Zero-Days, and Exploits
  • Revolutionizing ICS Security: The Power of OT Deception in Active Defense
  • Redefining Productivity: Why AI Should Replace Workflows
About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

CUBE Acquires 4CRisk.ai: Elevating AI Compliance and Risk Automation

February 23, 2026

Empowering the Agentic Endpoint

February 22, 2026

Cybersecurity Weekly: Major Breaches, Zero-Days, and Exploits

February 22, 2026
Most Popular

Absolute Launches GenAI Tools to Tackle Endpoint Risk

August 7, 202515 Views

Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms

July 8, 202510 Views

The CTEM Conversation We All Need

June 30, 202510 Views

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025

Categories

  • Compliance
  • Cyber Updates
  • Cybercrime and Ransomware
  • Editor's pick
  • Emerging Tech
  • Events
  • Featured
  • Insights
  • Threat Intelligence
  • Uncategorized
© 2026 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.