Google fixes bug that would reveal customers’ non-public cellphone numbers | TechCrunch


A safety researcher has found a bug that may very well be exploited to disclose the non-public restoration cellphone variety of virtually any Google account with out alerting its proprietor, doubtlessly exposing customers to privateness and safety dangers. 

Google confirmed to TechCrunch that it fastened the bug after the researcher alerted the corporate in April. 

The unbiased researcher, who goes by the deal with brutecat and blogged their findings, informed TechCrunch that they may get hold of the restoration cellphone variety of a Google account by exploiting a bug within the firm’s account restoration function.

The exploit relied on an “assault chain” of a number of particular person processes working in tandem, together with leaking the total show identify of a focused account, and bypassing an anti-bot safety mechanism that Google applied to stop the malicious spamming of password reset requests. Bypassing the speed restrict finally allowed the researcher to cycle by means of each attainable permutation of a Google account’s cellphone quantity in a brief area of time and arrive on the right digits.

By automating the assault chain with a script, the researcher stated it was attainable to brute-force a Google account proprietor’s restoration cellphone quantity in 20 minutes or much less, relying on the size of the cellphone quantity.

To check this, TechCrunch arrange a brand new Google account with a cellphone quantity that had by no means been used earlier than, then supplied brutecat with the e-mail tackle of our new Google account. 

A short while later, brutecat messaged again with the cellphone quantity that we had set.

“bingo :),” stated the researcher.

Revealing the non-public restoration cellphone quantity can expose even nameless Google accounts to focused assaults, akin to takeover makes an attempt. Figuring out a personal cellphone quantity related to somebody’s Google account may make it simpler for expert hackers to take management of that cellphone quantity by means of a SIM swap assault, for instance. With management of that cellphone quantity, the attacker can reset the password of any account related to that cellphone quantity by producing password reset codes despatched to that cellphone.

Given the potential danger to the broader public, TechCrunch agreed to carry this story till the bug may very well be fastened. 

“This problem has been fastened. We’ve all the time burdened the significance of working with the safety analysis group by means of our vulnerability rewards program and we wish to thank the researcher for flagging this problem,” Google spokesperson Kimberly Samra informed TechCrunch. “Researcher submissions like this are one of many some ways we’re capable of rapidly discover and repair points for the protection of our customers.”

Samra stated that the corporate has seen “no confirmed, direct hyperlinks to exploits at the moment.”

Brutecat stated Google paid $5,000 in a bug bounty reward for his or her discovering.

Leave a Reply

Your email address will not be published. Required fields are marked *