Bruteforcing the phone number of any Google user

brutecat.com

577 points by brutecat a day ago


zerof1l - a day ago

This article highlights something interesting... it is quite common to get at least one /64 IPv6 block from a hosting provider or ISP. Yet most of the rate-limiting and IP blocking is done for a single IP. Sounds like when dealing with IPv6, an entire block of /64 should be rate-limited or blocked.

atum47 - a day ago

I did something similar way back when I was trying to find the phone number for a person, using Facebook.

When recovering a password Facebook would give you most of the digits of the phone number, so I wrote them down in a vcard file and imported it on my phone to just look at the pictures. It worked surprisingly good.

VladVladikoff - a day ago

I’m mostly impressed that he can throw 40k requests per second at a server for a prolonged period and not somehow spike the resources enough to set off some alarms.

helsinki - a day ago

These bug bounties pay peanuts. Sad.

Noelia- - 21 hours ago

I’ve used plenty of forgot password forms before and entered my phone number to recover accounts, but I never really thought about how much information they could actually leak. It reminds me of those recovery flows from back in the day, where even just the last couple of digits of a phone number could end up being a real vulnerability for attackers. It’s surprising how something that seems harmless, like a simple recovery page, can actually hide some pretty serious security risks.

jeffbee - a day ago

It must be a daunting chore to maintain all the legacy pages. The amount of now-years-old stuff that long-standing sites have to maintain, or choose to maintain, is shockingly high, and testing the combination of all that stuff is impossible.

If you want an example of how diverse in age these apps are, dig around in the Gmail settings panel. Eventually you will land on a popup that uses the original Gmail look and feel, from 2004.

codedokode - 6 hours ago

I am sure some governments including mine would gladly pay more than $5 000 for this.

onlygoose - 18 hours ago

Off topic, it was very interesting to peek into libphonenumbers metadata. I find it curious that we have so many ways to write down an already standardized identifier.

cryptonector - a day ago

> 2025-05-15 - Panel awards $1,337 + swag. Rationale: Exploitation likelihood is low. (lol)

Yeah, no, the exploitation likelihood of this is very high. The number of users who might have their phone numbers revealed might be low, but I guarantee you that private investigators, detectives, criminals, etc. would all use this if they needed it and it was there.

Brybry - a day ago

> This time can also be significantly reduced through phone number hints from password reset flows in other services such as PayPal, which provide several more digits (ex. +14•••••1779)

I've never thought about this but it's extra scary. If you have the same phone number and email address with enough services and they all mask in a different order for reset hints...

ray023 - 15 hours ago

VERY discouraging to anyone considering being a white hacker. "Likelihood low" and only 5k bounty for this is pathetic.

atemerev - 16 hours ago

If you didn't change your phone number in the last two years or so, it is most probably in one of the data leaks that could be downloaded by anyone.

EGreg - a day ago

2025: https://qbix.com/blog/2025/06/06/%e2%80%9cno-way-to-prevent-...

2023: https://qbix.com/blog/2023/06/12/no-way-to-prevent-this-says...

2021: https://qbix.com/blog/2023/06/12/no-way-to-prevent-this-says...

Which is funnier?

vaseem - 21 hours ago

Btb. Thank you !

AtomicByte - a day ago

This is super creative and cool. Brutecat back at it again heh

PeeMcGee - a day ago

Wow, if I needed any more proof Google is a ghost ship then this is it. The $5K bounty is an insult, and the fact that they low-balled it in the first place makes them look like absolute clowns. Good on you for calling out how little of a shit Google gives about actually protecting user data.

paxys - a day ago

Neat find, though it's funny to me that a phone number is something people (including everyone on this thread I bet) have been handing out like candy their entire adult lives - to friends, stores, banks, employers, government agencies, random websites – but still expect it to remain some critical secret that no one should ever find out. A phone number is about as private as your name, and you should consider it as such.

msdrigg - a day ago

[flagged]

miyuru - a day ago

TIL about another google product I knew nothing about. https://lookerstudio.google.com

Phil_Latio - a day ago

Maybe this specific exploit was already known for a long time to an illegitimate actor, because legit actors saw past rewards and simply gave up too early.

$5000 (after complaining lol) really is a joke.

RankingMember - a day ago

> 2025-05-15 - Panel awards $1,337 + swag. Rationale: Exploitation likelihood is low. (lol)

Oh, so this is how vendors are going to start playing it to minimize bug bounty costs, huh? Good luck with that- the whole point of the award being a decent chunk of change is to make responsible disclosure more appealing to researchers who might otherwise go the other direction.

jasonthorsness - a day ago

To anyone whose number hasn't already leaked to the B2B SaaS outbound databases: do everything you can to protect your privacy there is still hope for you, the rest of us are already lost

curtisszmania - 20 hours ago

[dead]

Duskgmxx - 21 hours ago

[flagged]