Google Account Recovery Vulnerability Exposes Users' Phone Numbers to Attackers

A significant security flaw in Google’s account recovery system enabled malicious actors to acquire the phone numbers of any Google user through a sophisticated brute-force attack, as disclosed by a BruteCat security researcher this week.
The vulnerability, which has since been resolved, exploited Google’s No-JavaScript username recovery form to circumvent security measures and extract sensitive personal information.
This issue was rooted in Google’s legacy username recovery system, which operated without JavaScript enabled. A security researcher found that this overlooked endpoint could be manipulated to verify whether specific phone numbers were linked to particular display names, creating an opportunity for systematic phone number enumeration.
The attack methodology involved three main steps: first, obtaining the target’s Google account display name via Looker Studio by transferring document ownership, which would leak the victim’s name without requiring any interaction.
Second, the attacker initiated Google’s password recovery process to retrieve a masked phone number hint, revealing only the last few digits. Finally, a custom-built tool named “gpb” was used to brute-force the complete phone number by testing combinations against the known display name, according to the BruteCat report.
Vulnerability Exposes Users’ Phone Numbers
The researcher managed to bypass Google’s rate-limiting protections through clever technical workarounds. By utilizing IPv6 address ranges, which provide over 18 quintillion unique IP addresses, the attack could rotate through different addresses for each request, effectively evading Google’s anti-abuse mechanisms.
Additionally, the researcher discovered that botguard tokens from JavaScript-enabled forms could be repurposed for the No-JS version, eliminating captcha challenges that would typically hinder automated attacks.
The attack proved to be remarkably efficient, with the researcher achieving around 40,000 verification attempts per second using a modest server costing \$0.30 per hour.
Depending on the country code, complete phone numbers could be extracted in timeframes ranging from just seconds for smaller countries like Singapore to approximately 20 minutes for the United States.
Google was informed of the vulnerability on April 14, 2025, and responded promptly by implementing temporary mitigations while working on a permanent fix.
The company fully deprecated the vulnerable No-JS username recovery form by June 6, 2025, effectively closing the attack vector.
Recognizing the severity of the discovery, Google initially awarded a bounty of \$1,337, which was later increased to \$5,000 after the researcher appealed, citing the attack’s lack of prerequisites and undetectable nature.
This incident underscores the ongoing security challenges posed by legacy systems and highlights the necessity for comprehensive security audits across all service endpoints, even those that may seem outdated or infrequently used.
give SEO for this
- Other (42)
- Ransomware (151)
- Events and News (27)
- Features (45)
- Security (478)
- Tips (79)
- Google (24)
- Achievements (11)
- Products (34)
- Activation (7)
- Dealers (1)
- Bank Phishing (45)
- Malware Alerts (220)
- Cyber Attack (271)
- Data Backup (12)
- Data Breach (107)
- Phishing (160)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (16)
- Updates (3)
- Alert (71)
- Hacking (58)
- Social Media (8)
- vulnerability (59)
- Hacker (32)
- Spyware (11)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (3)
- Website hacks (6)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (7)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (4)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (12)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)