Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Vulnerabilities Exposed Phone Number of Any Google User

Google has awarded $5,000 to a researcher who found security holes that enabled brute-forcing the phone number of any user. 

Google vulnerability

Google recently patched a series of vulnerabilities that could have been exploited to obtain the phone number of any user. 

Details of the exploit were made public on Monday by the Singapore-based researcher who reported it to the tech giant. 

The researcher, who uses the online monikers Brutecat and Skull, said he came across the vulnerabilities after disabling JavaScript in his browser in an effort to determine whether any Google services still worked without JavaScript. 

He found that account recovery forms still worked, and they also allowed him to check — using two HTTP requests — whether a recovery email address or phone number was associated with a specified account display name. 

Further tests showed that he could also obtain the actual phone number associated with a specified display name through a brute-force attack. Google’s rate limiting protections were bypassed by using different IPv6 addresses for each request and a BotGuard token obtained from Google.

In order to leverage this for a practical exploit that would enable him to obtain any user’s phone number, the researcher also needed a way to obtain the display name associated with a given Gmail address. 

He achieved this by abusing a Google service named Looker Studio, designed for converting data into reports and dashboards. Creating a Looker Studio document and transferring its ownership to the targeted user’s email address would result in the victim’s display name being shown.

When all of this was put together, an attacker who knew the targeted user’s email address could have leveraged Looker Studio to obtain their display name, which could then be used through the password recovery page to obtain a masked phone number (last two digits), which could then be brute-forced to obtain the full phone number.

Advertisement. Scroll to continue reading.

Phone numbers may be considered highly sensitive information, often being targeted in social engineering and other types of attacks. 

The researcher has created a video showing the exploit in action:

According to tests conducted by Brutecat, a US phone number could have been obtained in roughly 20 minutes, a UK number in 4 minutes, and Netherlands and Singapore numbers could be brute-forced in seconds — all of this by renting a server at a cost of $0.30/hour.

Google was informed about the vulnerabilities in mid-April and rolled out mitigations in May and early June. The tech giant awarded Brutecat a $5,000 bug bounty for his findings.

In March, the researcher disclosed the details of a YouTube vulnerability that exposed the email addresses of content creators, for which he earned a $20,000 bug bounty.

Related: HPE Patches Critical Vulnerability in StoreOnce

Related: Google Researchers Find New Chrome Zero-Day

Related: Vulnerabilities in CISA KEV Are Not Equally Critical

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Cloud security startup Upwind has appointed Rinki Sethi as Chief Security Officer.

SAP security firm SecurityBridge announced the appointment of Roman Schubiger as the company’s new CRO.

Cybersecurity training and simulations provider SimSpace has appointed Peter Lee as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.