Security Researcher Uncovers Vulnerability Allowing Phone Number Exposure of Google Accounts

Security Researcher Uncovers Vulnerability Allowing Phone Number Exposure of Google Accounts

Google recently patched a vulnerability in its account recovery system that could have allowed attackers to guess users' recovery phone numbers. The flaw was found in an outdated, JavaScript-free username recovery form that lacked protections like CAPTCHA and rate-limiting, making it vulnerable to brute-force attacks. Singaporean researcher brutecat demonstrated that attackers could determine a phone number in seconds or minutes and potentially launch SIM-swapping attacks to hijack accounts.

The issue was reported to Google on April 14, 2025, and fixed on June 6, 2025. Google rewarded the researcher with $5,000.

Earlier, brutecat also discovered other significant vulnerabilities:

- A $10,000 flaw exposing YouTube channel owners' emails via API abuse.

- A $20,000 flaw in the /get_creator_channels endpoint that could reveal sensitive information of over 3 million YouTube Partner Program creators.

These vulnerabilities highlight the growing risks associated with digital platforms.

Stay secure — stay Wavasec. 🔐