Sunday, May 25, 2025
HomeCyber AttackTens of Millions of SMS text Messages & Massive Private Data Leaked...

Tens of Millions of SMS text Messages & Massive Private Data Leaked Online From Hacked Database

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a massive hacked database online that exposed tens of millions of SMS text messages, and private data belongs to a U.S company TrueDialog.

TrueDialog is an American communication company that offering SMS texting solutions to companies such as businesses, universities, and colleges in the USA.

Companies claim that they provide Enterprise-grade SMS Texting service, but this massive data leak indicates and leads to huge risks for their customers who have sent and received an SMS for a year of the period.

- Advertisement - Google News

By holding an unsecured database, TrueDialog leaked millions of people’s sensitive data across the USA, and the researchers confirmed that the unprotected database belongs to TrueDialog by finding the evidence of their Host ID “api.truedialog.com”.

Discovered database, Also contains millions of account usernames and passwords, PII data of TrueDialog users and their customers, and much more.

Since the uncovered database huge volume of data, there is no doubt that the company compromising the privacy and security of 100 million US citizens across the country.

The Database with 604 GB of data and 1 billion entries that had sensitive data was initially discovered on 26/11/19, and it is hosted by Microsoft Azure and runs on the Oracle Marketing Cloud in the USA.

What Types of Data Stored in the Unprotected Database

Researchers claim that the database contains different entries related to many aspects of TrueDialog’s business model and its a rare one that the single database with this much huge volume of sensitive data.

The database contains millions of email addresses, usernames, cleartext passwords, and base64 encoded passwords which can be easily decrypted.

According to VPNMentor research “Tens of millions of entries from messages sent via TrueDialog and conversations hosted on the platform and the Messages including,

  • Full Names of recipients, TrueDialog account holders, & TrueDialog users
  • Content of messages
  • Email addresses
  • Phone numbers of recipients and users
  • Dates and times messages were sent
  • Status indicators on messages sent, like Reading receipts, replies, etc.
  • TrueDialog account details
TrueDialog
Username & Password
TrueDialog
SMS conversation

The researcher also found some of the technical logs that revealed important details as to how the database is structured and managed.

This massive leak could lead to potential risks for the customers, and if it reached the wrong hand, cybercriminals could perform various attacks such as Phishing and scams, Identity theft, and Fraud, Account Takeover and Blackmail the customers.

TrueDialog has been finally closed the database and the database now secured. you can also check the important network security principles to protect businesses from cyber attacks.

Also Read: Black Friday Deals: All Master Level Cyber Security Bundle Courses From “Ethical Hackers Academy” With 90 % Offer

Read More:

MixCloud Hacked – 20 Million+ Users Stolen Personal Records Selling in Dark Web for $4,000

Adobe Hacked – Hackers Exploit The Bug in Magento Marketplace & Gained Access To The Users Data

Massive Data Leak – 1.2 Billion People Personal & Social Information That Consist of 4TB Data Exposed Online

OnePlus Hacked – Customers’ Personal Information Accessed by Hackers

T-Mobile Hacked – Hackers Gained Access to Prepaid Customers Data

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...