Researcher Uncover Google Reveals Recovery Phone Numbers
Security researcher "brutecat" discovered a vulnerability in Google's old username recovery system that allows attackers to brute-force users' recovery phone numbers in seconds. To do this, they'd disable JavaScript and use the recovery password method. Additionally, by browsing Looker Studio document sharing, attackers can reveal users' information, including name and phone number, which shows the last digit, allowing them to bypass CAPTCHA and brute-force the remaining number. As the article shows, a Singaporean phone number can be uncovered in seconds, while a U.S.-based number can take around 20 minutes. This type of vulnerability poses a significant risk, including unauthorized account access and SIM swapping attacks. After Google learned about this attack, they responded by removing the vulnerable form and awarded the researcher a $5,000 bug bounty. This incident highlights how even the simplest thing can lead to a major attack. Companies shouldn't overlook outdated recovery methods; instead, they should implement strong security measures that update authentication and recovery systems.
https://thehackernews.com/2025/06/researcher-found-flaw-to-discover-phone.html
Comments
Post a Comment