Wednesday, March 19, 2025
HomeData BreachMassive Data Leak - 419 Million Facebook Users' Phone Numbers Exposed

Massive Data Leak – 419 Million Facebook Users’ Phone Numbers Exposed

Published on

SIEM as a Service

Follow Us on Google News

419 Million Facebook user accounts exposed online from an unsecured server that includes a unique Facebook ID and the phone number listed with the account.

The details are exposed from the server that doesn’t have any password protection, the database is accessible for anyone who knows the server’s IP.

The exposed details include 419 million records on users across the globe, among that 133 million records on the account associated with U.S. based users, 18 million U.K. users and 50 million Vietnam users.

Security researcher, Sanyam Jain identified the database and reported to TechCrunch. Jain able to verify the phone numbers of several celebrities.

TechCrunch able to verify the Facebook user’s phone number against the Facebook ID and some of the record’s include user’s name, gender, and location by country.

Facebook Spokesperson Jay Nancarrow said, that the data are an old one and they are scrapped before Facebook disabled the ability to search other people’s account using the phone number.

“The data set has been taken down and we have seen no evidence that Facebook accounts were compromised,” he added.

But it is still unknown on who scrapped the data and how the data was scraped from Facebook. The social media giant involves in several security incidents starting from Cambridge Analytica Scandal.

Recently Facebook revealed that they stored tens of millions of Facebook password in plain text including thousand of the Instagram password.

Facebook launched a new tool dubbed Off-Facebook Activity, which allows you to control and view the apps and websites that send information to Facebook about your interest and activity.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and Hacking News update.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it...

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to...

US Sperm Donor Giant California Cryobank Hit by Data Breach

California Cryobank, a leading sperm donation facility based in Los Angeles, has been impacted...

Cloudflare Introduces Cloudforce One to Detect and Analyze IoCs, IPs, and Domains

Cloudflare, a leading web infrastructure and security company, has launched the Cloudforce One threat...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

US Sperm Donor Giant California Cryobank Hit by Data Breach

California Cryobank, a leading sperm donation facility based in Los Angeles, has been impacted...

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials

The HELLCAT ransomware group has claimed responsibility for a significant data breach at Jaguar...

86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration

A non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered...