BTCC / BTCC Square / coincentral /
Google Plugs Critical Security Hole That Leaked User Recovery Phone Numbers

Google Plugs Critical Security Hole That Leaked User Recovery Phone Numbers

Published:
2025-06-10 09:05:42
18
3

Google Patches Security Flaw That Exposed Recovery Phone Numbers

Another day, another data exposure—this time courtesy of a Google security flaw that left recovery phone numbers dangling in the wind. Because nothing says 'trust us with your digital life' like a backdoor for hackers.

Tech giant scrambles to patch vulnerability after discovery. No breach confirmed—yet. But let's be real: in the age of ransomware-as-a-service, it's only a matter of time before some crypto-grifters weaponize this for 'account recovery' phishing scams.

Bonus finance jab: At least your stolen phone number won't drop 40% overnight like your altcoin portfolio.

TLDR;

  • Google has patched a flaw that let attackers brute-force users’ recovery phone numbers.
  • A security researcher discovered and responsibly disclosed the vulnerability.
  • Google confirmed no known malicious use of the flaw before the fix.
  • The incident highlights broader concerns about the security of phone-based account recovery.

Google has quietly resolved a critical vulnerability in its account recovery process that exposed users’ recovery phone numbers to potential attackers.

The issue came to light after a security researcher, known online as “brutecat,” identified a method to bypass the company’s protective measures, including anti-bot systems and rate limits. By exploiting these weaknesses, the researcher could automate and brute-force access to partial phone number information linked to Google accounts in a matter of minutes.

Notably, the vulnerability allowed attackers to repeatedly query Google’s recovery system and deduce recovery phone numbers without proper authorization. According to independent testing by TechCrunch using a test account, the exploit proved to be functional and fast, raising alarms about its potential real-world impact.

Google Responds

Once alerted to the vulnerability in April, Google moved swiftly to patch the flaw. A spokesperson confirmed that the issue has now been addressed, stating, “We’ve always stressed the importance of working with the security research community through our vulnerability rewards program and we want to thank the researcher for flagging this issue.”

The company emphasized that no evidence has emerged suggesting the bug was exploited by malicious actors before it was reported. Google awarded the researcher a $5,000 bounty through its bug bounty program, a testament to the growing reliance on external white-hat hackers to identify vulnerabilities before bad actors do.

Recovery Numbers Matter More Than You Think

While phone numbers may seem like minor pieces of personal information, they have become valuable targets for cybercriminals. Recovery numbers often serve as a key to regaining access to locked accounts and are also used in two-factor authentication systems. If a bad actor obtains a recovery number, they may be able to execute SIM swapping attacks or manipulate other services tied to the number.

In recent years, major breaches across the tech industry have highlighted how phone numbers can become the starting point for identity theft and unauthorized access. As attackers grow more sophisticated, access to just one recovery number can potentially open a gateway to multiple services and sensitive data.

The Trade-Off Between Security and Convenience

The flaw also sheds light on the complex balancing act tech companies face when designing account recovery systems. While recovery options like phone numbers are intended to help users regain access in legitimate cases, they can inadvertently open the door to abuse if not properly protected.

Security researchers and engineers continue to debate how to create recovery mechanisms that are both secure and user-friendly. The exploit discovered by “brutecat” reveals how small weaknesses in separate systems,  in this case, rate limiting and bot detection  can be chained together to bypass safeguards.

That said, this incident underscores why many tech platforms are transitioning away from phone-based recovery in favor of more secure options like hardware security keys or app-based authenticators. These newer methods are more resistant to interception and provide an added LAYER of protection in an era where personal data is increasingly under threat.

 

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users