Report: Facebook Database Found Online Exposed Phone Numbers of Millions

Report: Facebook Database Found Online Exposed Phone Numbers of Millions

A database that was left without password protection was discovered by a security researcher, who said 419 million records of Facebook user phone numbers were exposed.

Following a year of vocal concerns from lawmakers and users about Facebook’s security practices, the social media giant is facing renewed outrage over a database discovered online that reportedly contained hundreds of millions of user phone numbers.

Security researcher Sanyam Jain found the database online and shared the discovery with TechCrunch. The database seems to be connected to a tool no longer used by Facebook that allowed users to search for potential friends based on phone number that a user had willingly given the site.

A server that did not belong to Facebook, and was publicly accessible without password protection, housed a database of the phone numbers. Jain told TechCrunch that he found several phone numbers of celebrities in the database, which was taken down after the news outlet contacted the web host. The owner of the server is still unknown.

While Jain said the database contained records of more than 419 million Facebook users, with 133 million alone in the U.S., Facebook’s PR team is telling reporters that the figure is bloated and that the server contained “closer to half” of 419 million, according to Gizmodo.

Jay Nancarrow, a spokesperson for Facebook, told TechCrunch that the data was scraped before Facebook cut off access to user phone numbers in April 2018.

“The data set has been taken down and we have seen no evidence that Facebook accounts were compromised,” he said.

Still, security experts note that cell phone number data in particular is sensitive to abuse from targeted robocalls, malware attacks and more.

“[Users] can’t recover by something as simple as changing their password – they would have to redo their Facebook account or get a different phone number – both very unappealing actions,” said Pankaj Parekh, chief product and strategy officer at SecurityFirst. “Another example of people’s personal data being exposed by careless actions of those trusted to safeguard it.”

Paul Bischoff, privacy advocate for Comparitech, said the exposure could put millions of Facebook users at risk of spam, harassment and SIM swap fraud. Because phone numbers are often used for two-factor authentication, the information could be abused by malicious actors, he added.

“By moving an existing phone number to a new SIM card, an attacker will receive the PIN number sent to the user's phone via SMS when logging in,” Bischoff said.

For Johnathan Deveaux, head of enterprise data protection at comforte AG, the main risk of the incident is the potential of spam calls, which are consistent nuisances even to people who have not had their phone number leaked.

“The more sensitive data a company has, the more critical it is to protect the data,” Deveaux said. “A ‘security-first’ policy employing a data-centric approach helps ensure data is protected throughout an organization.”


About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.


  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

  • Achieving Clear Communications

    Achieving Clear Communications

    Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more. Read Now

  • Taking Flight

    Taking Flight

    Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring. Read Now

Featured Cybersecurity

New Products

  • Schlage RC reader controller

    Schlage RC Reader Controller

    This new innovative device combines the power of the Pure IP™ access control technology pioneered by ISONAS with Schlage’s intelligent hardware and credentials, delivering a comprehensive and cost-effective perimeter solution to customers. 3

  • Genetec Security Center

    Genetec Security Center

    This major new release allows more system components to run in the cloud, reducing the gap between cloud and on-premises security systems. It also makes it easier to connect external systems and tap external data for use in dashboards, maps and investigations without relying on complex, specialized integrations. 3

  • PACE® Long Range Ethernet Solutions

    PACE® Long Range Ethernet Solutions

    Altronix introduces the newest addition to its portfolio of PACE® Long Range Ethernet Solutions. 3