A security researcher has found a bug that may very well be exploited to disclose the personal restoration telephone variety of virtually any Google account with out alerting its proprietor, probably exposing customers to privateness and security dangers.
Google confirmed to information.killnetswitch that it fastened the bug after the researcher alerted the corporate in April.
The impartial researcher, who goes by the deal with brutecat and blogged their findings, informed information.killnetswitch that they might acquire the restoration telephone variety of a Google account by exploiting a bug within the firm’s account restoration characteristic.
The exploit relied on an “assault chain” of a number of particular person processes working in tandem, together with leaking the total show identify of a focused account, and bypassing an anti-bot safety mechanism that Google applied to stop the malicious spamming of password reset requests. Bypassing the speed restrict in the end allowed the researcher to cycle by each doable permutation of a Google account’s telephone quantity in a brief area of time and arrive on the right digits.
By automating the assault chain with a script, the researcher stated it was doable to brute-force a Google account proprietor’s restoration telephone quantity in 20 minutes or much less, relying on the size of the telephone quantity.
To check this, information.killnetswitch arrange a brand new Google account with a telephone quantity that had by no means been used earlier than, then offered brutecat with the e-mail tackle of our new Google account.
A short while later, brutecat messaged again with the telephone quantity that we had set.
“bingo :),” stated the researcher.
Revealing the personal restoration telephone quantity can expose even nameless Google accounts to focused assaults, akin to takeover makes an attempt. Figuring out a non-public telephone quantity related to somebody’s Google account might make it simpler for expert hackers to take management of that telephone quantity by a SIM swap assault, for instance. With management of that telephone quantity, the attacker can reset the password of any account related to that telephone quantity by producing password reset codes despatched to that telephone.
Given the potential danger to the broader public, information.killnetswitch agreed to carry this story till the bug may very well be fastened.
“This concern has been fastened. We’ve all the time confused the significance of working with the security analysis neighborhood by our vulnerability rewards program and we wish to thank the researcher for flagging this concern,” Google spokesperson Kimberly Samra informed information.killnetswitch. “Researcher submissions like this are one of many some ways we’re capable of shortly discover and repair points for the protection of our customers.”
Samra stated that the corporate has seen “no confirmed, direct hyperlinks to exploits at the moment.”
Brutecat stated Google paid $5,000 in a bug bounty reward for his or her discovering.



