Google brute-force attack reveals phone numbers quickly

Share This Post

Google’s Authentication System Flaw: A Wake-Up Call for Cybersecurity

In a startling revelation, a security researcher known as Brutecat has uncovered a serious vulnerability in Google’s authentication systems. This flaw leaves users’ mobile phone numbers vulnerable to exposure within minutes, raising alarms about the safety measures protecting user data.

The Exploit Unveiled

Brutecat discovered this security breach during an in-depth analysis of Google’s account recovery process. The hacker noted that simply knowing the email address of a victim could grant access to their phone number. “This exploit just requires the email address of the victim and you can get the phone number tied to the account,” Brutecat explained in a conversation with The Register.

How It Works: The Mechanics Behind the Attack

The root of the issue lies in a code slip that enables brute-force attacks on Google accounts. By utilizing cloud services and a Google Looker Studio account, attackers can bypass security protocols and execute a brute-force attack effortlessly.

Brutecat detailed the process, stating, “After exploring various Google products, I discovered I could create a Looker Studio document, transfer ownership to the victim, and without any victim interaction, leak their display name.”

In addition, an old-school username recovery form Sans JavaScript allowed the hacker to verify if a recovery email or phone number was associated with a specific display name through minimal HTTP requests.

A Fast-Paced Race Against Time

The efficiency of the brute-force tool, codenamed gpb, enabled the hacker to extract phone numbers in astonishingly short times:

  • Netherlands (+31): 15 seconds
  • Singapore (+65): 5 seconds
  • UK (+44): 4 minutes
  • US (+1): 20 minutes

Using this tool, combined with real-time libphonenumber validation, the researcher could distinguish valid number queries from invalid ones.

Google’s Response: Fast Action but Low Bounty

Despite the severity of the flaw, Google assessed it as less critical than one might expect. The tech giant awarded Brutecat $5,000 through its bug bounty program. “Google was receptive and patched the bug promptly. They depreciated the entire form in comparison to my other disclosures, which were addressed more slowly,” Brutecat noted.

In response to the concerns raised, a Google spokesperson affirmed, “This issue has been fixed. We stress the importance of working with the security research community and appreciate the researcher for flagging this issue. Submissions like this enable us to quickly find and rectify vulnerabilities for the safety of our users.”

Conclusion: The Importance of Vigilance in Cybersecurity

This incident serves as a crucial reminder of the vulnerabilities that can exist even in established systems like Google’s. As technology evolves, so do the tactics of malicious actors.

The investigation reveals the importance of robust security measures and ongoing vigilance against potential exploits, highlighting the need for continued collaboration between tech companies and the security research community. For more information on Google’s security measures, explore their Vulnerability Rewards Program.

As cybersecurity becomes increasingly complex, users must remain informed and proactive in protecting their digital identities. The world of technology is fast-paced—staying one step ahead is essential.

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

Check all Categories of Articles

Do You Want To Boost Your Business?

drop us a line and keep in touch
franetic-agencia-de-marketing-digital-entre-em-contacto