Saturday, March 8, 2025
HomeData Breach533 MILLION Facebook Users Personal Data Leaked That Includes Mark Zuckerberg's Cell...

533 MILLION Facebook Users Personal Data Leaked That Includes Mark Zuckerberg’s Cell Phone Number

Published on

SIEM as a Service

Follow Us on Google News

Recently, on a hacker forum, more than 533 million users’ personal data of the social network giant Facebook were leaked and published. 

The personal data of Facebook users that were leaked was in the public domain, and the leaked data of the users were from 106 countries of the world.

According to the reports, the leaked data includes the accounts of:-

  • 32 million US residents
  • 11 million British residents
  • 6 million Indian residents

Data Involved

Alon Gal, the co-founder of the Israeli cybercrime intelligence firm, Hudson Rock, asserted that “A database of this size, containing personal data like the phone numbers of many Facebook users, is likely to lead to a situation in which attackers can use these data to execute social attacks like social engineering to scam, hack, and other frauds.”

https://twitter.com/UnderTheBreach/status/1378314424239460352

The type of data of the users involved and were posted on the forum in this incident are mentioned below:-

  • Full names
  • Date of birth
  • Biographies of users
  • Real location
  • Mobile numbers
  • Email addresses

Earlier in February 2021, it was reported that a database containing more than 370 million Facebook users was published in the public domain. While that database consisted of 108 text files, and each of them contains the data from a particular country.

But, this current leaked database contains a more complete and huge mass of information as compared to the earlier one. As in this database, users from 106 countries were involved, like the US, the UK, India, Afghanistan, Iraq, etc.

Leaked Data Includes Mark Zuckerberg’s Mobile Number

Along with the 533 million personal data of the users of Facebook, the phone number of Facebook’s founder, Mark Zuckerberg, is also leaked and posted in the wild. Here, the incident came to light when a Twitter user, “Walker”, noticed and reported the leaked data of Mark Zuckerberg by tweeting:-

“Regarding the #FacebookLeak, of the 533M people in the leak – the irony is that Mark Zuckerberg is regrettably included in the leak as well.”

But, this data breach faints before the fact of the divulgence of Mark Zuckerberg’s phone number.

Moreover, when Facebook was contacted, a spokesperson affirmed that this is old data, as earlier in 2019 it was reported and was also fixed in August 2019. But, they didn’t mentioned or comment anything about the leaked data of Mark Zuckerberg.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...