Bruteforcing the phone number of any Google user

(brutecat.com)

Comments

zerof1l 9 June 2025
This article highlights something interesting... it is quite common to get at least one /64 IPv6 block from a hosting provider or ISP. Yet most of the rate-limiting and IP blocking is done for a single IP. Sounds like when dealing with IPv6, an entire block of /64 should be rate-limited or blocked.
jeffbee 9 June 2025
It must be a daunting chore to maintain all the legacy pages. The amount of now-years-old stuff that long-standing sites have to maintain, or choose to maintain, is shockingly high, and testing the combination of all that stuff is impossible.

If you want an example of how diverse in age these apps are, dig around in the Gmail settings panel. Eventually you will land on a popup that uses the original Gmail look and feel, from 2004.

atum47 9 June 2025
I did something similar way back when I was trying to find the phone number for a person, using Facebook.

When recovering a password Facebook would give you most of the digits of the phone number, so I wrote them down in a vcard file and imported it on my phone to just look at the pictures. It worked surprisingly good.

VladVladikoff 9 June 2025
I’m mostly impressed that he can throw 40k requests per second at a server for a prolonged period and not somehow spike the resources enough to set off some alarms.
helsinki 9 June 2025
These bug bounties pay peanuts. Sad.
gcanyon 11 June 2025
> This request allows us to check if a Google account exists with that phone number as well as the display name "John Smith".

Shouldn't the rate limit be set here, related to the display name "John Smith"? You get 5 "John Smiths" for free in the first minute, then 5 more in the first hour, then 5 more in each day going forward. With the same million phone number combos you'd need roughly half a lifetime (10,000 days) to get the hit on average.

Noelia- 10 June 2025
I’ve used plenty of forgot password forms before and entered my phone number to recover accounts, but I never really thought about how much information they could actually leak. It reminds me of those recovery flows from back in the day, where even just the last couple of digits of a phone number could end up being a real vulnerability for attackers. It’s surprising how something that seems harmless, like a simple recovery page, can actually hide some pretty serious security risks.
gcanyon 11 June 2025
> Vendor confirms that the No-JS username recovery form has been fully deprecated

It seems like there are probably people out there with JS disabled for whatever reason who still might need to recover their password?

onlygoose 10 June 2025
Off topic, it was very interesting to peek into libphonenumbers metadata. I find it curious that we have so many ways to write down an already standardized identifier.
atemerev 10 June 2025
If you didn't change your phone number in the last two years or so, it is most probably in one of the data leaks that could be downloaded by anyone.
cryptonector 9 June 2025
> 2025-05-15 - Panel awards $1,337 + swag. Rationale: Exploitation likelihood is low. (lol)

Yeah, no, the exploitation likelihood of this is very high. The number of users who might have their phone numbers revealed might be low, but I guarantee you that private investigators, detectives, criminals, etc. would all use this if they needed it and it was there.

Brybry 9 June 2025
> This time can also be significantly reduced through phone number hints from password reset flows in other services such as PayPal, which provide several more digits (ex. +14•••••1779)

I've never thought about this but it's extra scary. If you have the same phone number and email address with enough services and they all mask in a different order for reset hints...

codedokode 10 June 2025
I am sure some governments including mine would gladly pay more than $5 000 for this.
ray023 10 June 2025
VERY discouraging to anyone considering being a white hacker. "Likelihood low" and only 5k bounty for this is pathetic.
vaseem 10 June 2025
Btb. Thank you !
AtomicByte 9 June 2025
This is super creative and cool. Brutecat back at it again heh
PeeMcGee 9 June 2025
Wow, if I needed any more proof Google is a ghost ship then this is it. The $5K bounty is an insult, and the fact that they low-balled it in the first place makes them look like absolute clowns. Good on you for calling out how little of a shit Google gives about actually protecting user data.
paxys 9 June 2025
Neat find, though it's funny to me that a phone number is something people (including everyone on this thread I bet) have been handing out like candy their entire adult lives - to friends, stores, banks, employers, government agencies, random websites – but still expect it to remain some critical secret that no one should ever find out. A phone number is about as private as your name, and you should consider it as such.
msdrigg 9 June 2025
[flagged]
miyuru 9 June 2025
TIL about another google product I knew nothing about. https://lookerstudio.google.com
Phil_Latio 9 June 2025
Maybe this specific exploit was already known for a long time to an illegitimate actor, because legit actors saw past rewards and simply gave up too early.

$5000 (after complaining lol) really is a joke.

RankingMember 9 June 2025
> 2025-05-15 - Panel awards $1,337 + swag. Rationale: Exploitation likelihood is low. (lol)

Oh, so this is how vendors are going to start playing it to minimize bug bounty costs, huh? Good luck with that- the whole point of the award being a decent chunk of change is to make responsible disclosure more appealing to researchers who might otherwise go the other direction.

jasonthorsness 9 June 2025
To anyone whose number hasn't already leaked to the B2B SaaS outbound databases: do everything you can to protect your privacy there is still hope for you, the rest of us are already lost