Saturday, June 22, 2024

Massive Data Leak – 419 Million Facebook Users’ Phone Numbers Exposed

419 Million Facebook user accounts exposed online from an unsecured server that includes a unique Facebook ID and the phone number listed with the account.

The details are exposed from the server that doesn’t have any password protection, the database is accessible for anyone who knows the server’s IP.

The exposed details include 419 million records on users across the globe, among that 133 million records on the account associated with U.S. based users, 18 million U.K. users and 50 million Vietnam users.

Security researcher, Sanyam Jain identified the database and reported to TechCrunch. Jain able to verify the phone numbers of several celebrities.

TechCrunch able to verify the Facebook user’s phone number against the Facebook ID and some of the record’s include user’s name, gender, and location by country.

Facebook Spokesperson Jay Nancarrow said, that the data are an old one and they are scrapped before Facebook disabled the ability to search other people’s account using the phone number.

“The data set has been taken down and we have seen no evidence that Facebook accounts were compromised,” he added.

But it is still unknown on who scrapped the data and how the data was scraped from Facebook. The social media giant involves in several security incidents starting from Cambridge Analytica Scandal.

Recently Facebook revealed that they stored tens of millions of Facebook password in plain text including thousand of the Instagram password.

Facebook launched a new tool dubbed Off-Facebook Activity, which allows you to control and view the apps and websites that send information to Facebook about your interest and activity.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and Hacking News update.


Latest articles

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from for...

Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information

A recent rise in data breaches from illegal Chinese OTT platforms exposes that user...

Beware Of Zergeca Botnet with Advanced Scanning & Persistence Features

A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart...

Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to...

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and...

Hackers Weaponizing Windows Shortcut Files for Phishing

LNK files, a shortcut file type in Windows OS, provide easy access to programs,...

New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document

Researchers discovered a new malware loader named SquidLoader targeting Chinese organizations, which arrives as...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles