Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    JP Morgan Employees Report Low Culture Score: Survey

    June 11, 2025

    Has the attacker laziness enabled by the Genai shortcut to make them easier to catch?

    June 11, 2025

    Openai signed a stunning deal with Google – why does it matter here

    June 11, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Google Patch bug leak phone number tied to accounts
    Security

    Google Patch bug leak phone number tied to accounts

    PineapplesUpdateBy PineapplesUpdateJune 10, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Google Patch bug leak phone number tied to accounts
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Google Patch bug leak phone number tied to accounts

    A vulnerability allowed researchers to incite the recovery phone number of any Google account to know their profile name and easily received partial phone number, which posed a big risk for fishing and SIM-swapping attacks.

    The method of attack involves misusing the now-deprived JavaScript-competent version of the Google user name recovery form, which lacked the anti-modern-day security security.

    The defect was discovered Safety researcator brutecatIt is possible to highlight the private email address of YouTube accounts in February.

    Brutecat told Bleepingcomputer that when the attack rebuilt the phone number users configured for Google Account Recovery, it is similar to the primary phone number of the account holder in most cases.

    Brute-Forcing Google Number

    Brutecat found that he could use an inheritance no-javascript user name recovery form, which was expected working.

    If the phone number two post requests was connected with the Google account based on the user’s profile display name (“John Smith”), the form allowed Query.

    The researcher ignored these requests /64 subnets by using the rotation of the IPV6 address to generate the trillions of the unique source of IPS through subnets.

    The captures displayed by several requests were bypassed by replacing the parameters ‘Bgresponse = JS_DISABLED’ with a valid bootguard token from JS-competent form.

    Google JS-competent User Name captured Bootguard Token from Recovery Form
    Google JS-competent User Name captured Bootguard Token from Recovery Form
    Source: Brutecat

    With technology sets, Brutecat developed a brute-oorcing tool (GPB), which recurrence through the number range using country-specific forms and filters false positivity.

    The researcher used Google’s ‘Libphonenumber’ to generate valid number forms, built a country mask database to identify phone formats by the region, and wrote a script to generate board tokens through the headless chrome.

    At a brutal-founding rate of 40,000 requests per second, US number will take about 20 minutes, UK 4 minutes and Netherlands less than 15 seconds.

    Time for Brut-Force Phone Number
    Time for Brut-Force Phone Number
    Source: Brutecat

    To start an attack against someone, their email address is required for form, but Google has hidden it since last year.

    Brutecat found that he could retrieve it by creating a look studio document and transferring ownership to the target’s Gmail address.

    Once the ownership is transferred, the target’s Google performance name appears on the dashboard’s lukear studio dashboard, which requires zero interaction with the target.

    Armed with this email address, they can repeatedly question all the phone numbers associated with the profile name.

    Although, as thousands of accounts with the same profile name may be, the researcher limited it using a partial number of the target.

    To get a partial phone number for the user, the researcher used Google’s “Account Recovery” workflow, which would display two digits of a configured recovery phone number.

    “This time can also be significantly reduced through the phone number signal from the password reset flow in other services like Payal, which gives many more digits (EX.

    Leaking the phone numbers attached to the Google account can lead to a large -scale security risk for users, which can later be targeted in targeted wishing attacks or SIM swap attacks.

    The performance of exploiting this defect can be seen in the video below.

    https://www.youtube.com/watch?v=AM3IPLYZ4SW

    Bug fixed

    On April 14, 2025, Brutecat reported his conclusions to Google through Tech Giant Valnarability Reward Program (VRP).

    Google initially considered the absorbent risk to be low, but on May 22, 2025, it upgraded the issue to “moderate severity”, implemented interim mitigations and gave a reward of $ 5,000 to the researcher for disclosure.

    On June 6, 2025, Google confirmed that it completely removed the weak NO-JS Recovery & Point.

    The attack vector is no longer an exploitative, but it is unknown whether it was ever maliciously exploited.


    Tines needle

    Patching meant complex scripts, long and endless fire drills. No more.

    In this new guide, the tines break down how it is leveling with modern organ automation. Patch fast, reduce overhead, and focus on strategic tasks – no complex script is required.

    accounts Bug Google leak number patch phone tied
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleApple Vision Pro – Visionos 26 sets stage for killer smart glasses
    Next Article IOS 26 how to install now (and why you should not do)
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Has the attacker laziness enabled by the Genai shortcut to make them easier to catch?

    June 11, 2025
    How-To

    Openai signed a stunning deal with Google – why does it matter here

    June 11, 2025
    Security

    Patch Tuesday, June 2025 Edition – Crebs on Security

    June 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025669 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025597 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025546 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Exclusive: OURA explains how it is changing the game for menstrual tracking

    May 18, 20250 Views

    Instagram probe shows that sexual content is served to teenagers

    May 18, 20250 Views

    Premier League Soccer: Stream Lecester vs. Ipswich lives from anywhere

    May 18, 20250 Views
    Our Picks

    JP Morgan Employees Report Low Culture Score: Survey

    June 11, 2025

    Has the attacker laziness enabled by the Genai shortcut to make them easier to catch?

    June 11, 2025

    Openai signed a stunning deal with Google – why does it matter here

    June 11, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.