LOADING...
Summarize
Google fixes bug that exposed private phone numbers
The issue enabled automated brute‑force attacks using simple scripts

Google fixes bug that exposed private phone numbers

Jun 10, 2025
09:41 am

What's the story

Google has patched a critical bug that allowed attackers to expose private recovery phone numbers tied to Google accounts. A security researcher known as brutecat uncovered the flaw in the legacy username recovery form in mid-April and reported it to the tech giant. The issue enabled automated brute‑force attacks using simple scripts. Google has now fully disabled the vulnerable endpoint and issued a fix to protect user privacy.

Attack details

How the exploit worked

The exploit involved an "attack chain" of multiple processes, including leaking the full display name of a targeted account. It also bypassed an anti-bot protection mechanism that Google had put in place to stop malicious password reset requests from being spammed. By bypassing this rate limit, brutecat was able to quickly cycle through every possible combination of a Google account's phone number and find the right one within minutes.

Risk assessment

Script automated the attack chain

The researcher automated the attack chain with a script, making it possible to brute-force a Google account owner's recovery phone number in less than 20 minutes. TechCrunch tested this by creating a new Google account with an unused phone number and giving brutecat its email address. The researcher was able to reveal the private recovery phone number within minutes, confirming the vulnerability of even anonymous Google accounts to targeted attacks like takeover attempts.

Bug bounty

Google has fixed the issue

A Google spokesperson confirmed that the issue has been resolved and thanked the researcher for bringing it to their attention through their vulnerability rewards program. The company has not seen "any confirmed, direct links to exploits at this time." For their discovery, brutecat received a $5,000 bug bounty from Google.