Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The researcher found a drawback to detect the phone numbers associated with any Google account
Global Security

The researcher found a drawback to detect the phone numbers associated with any Google account

AdminBy AdminJune 10, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 10, 2025Red LakshmananVulnerability / security API

Google has entered to resolve the lack of security that could allow you to resolve your phone recovery number, potentially exposing their privacy and security risks.

The problem In the hall For Singapore, Brutecat security researcher uses the problem in the company’s recovery function.

Given this, using the loops of vulnerabilities on several moving parts, specifically focusing on the JavaScript-Disabled recovery version, which recovery of Google (“Google (.) Com/signin/Usernamerecovery”), which lacked a system designed to prevent spam.

The page in question is designed to help users check if the recovery number or phone number is related to a specific display name (such as “John Smith”).

Cybersecurity

But the catch -based limited rate management eventually allowed to try all the reshuffle of the Google account number in the short period of time and come to the correct numbers per seconds or minutes, depending on the length of the phone number (which ranges from country to country).

The attacker can also take advantage of the forgotten Google password to find out the country’s country’s number -related victim’s phone number, and get their display name by creating A Looer Studio The document and the transfer of the victim’s ownership that actually forced their full leak on the main page.

In general, the feat requires the following steps –

  • Labor
  • Run the forgotten password stream for the target email address to get a camouflage phone number with the last two numbers reflected by the attacker (for example, •• •••• 03)
  • Brown Power Phone number in relation

Brutecat said the Singapore number can be traced with the aforementioned equipment in 5 seconds, while the US number can be exposed in about 20 minutes.

https://www.youtube.com/watch?v=am3iplyz4sw

Armed with knowledge of the phone number associated with Google account, a bad actor can take control of it through it Attack to move SIM And eventually reset the password of any account associated with this phone number.

After the responsible disclosure of information on April 14, 2025, Google rewarded the researcher of $ 5,000, and connected the vulnerability, completely getting rid of a user recovery form that is not JavaScript, as of June 6, 2025.

The conclusions come in a few months after the same researcher minute Another 10,000 dollars exploit that the attacker could armed to expose the email address of any YouTube channel owner by attaching API YouTube and outdated web -api associated with a pixel voice recorder.

Cybersecurity

Then in March also Brutecat disclosed that can get email addresses belonging to the creators that are included in the YouTube partner program (Ypp) using the access problem at the final point “/Get_Creator_channels”, receiving a $ 20,000 reward.

“(An) problem with access control to /get_Creator_channels Channel Channel Contentownerasciation, leading to an e -mail disclosure via API Content ID, Google, Google – Note.

“The attacker, who has access to Google account, which had a channel that joined the YouTube Affiliate Program (over 3 million channels), can receive an email address, as well as the monetization details of any other YouTube partner.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.