Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Data leak on Facebook: 419 million public phone numbers!
Security Awareness

Data leak on Facebook: 419 million public phone numbers!

One data leak on Facebook follows the next - it won't be quiet around the social network group. Now 419 million phone numbers of accounts have been published. T...

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: October 9, 2024 3 Min. read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Table of Contents (3 sections)

One data leak on Facebook follows the next - it won’t be quiet around the social network group. Now 419 million phone numbers of accounts have been published. The unencrypted data is linked to the Facebook ID and can thus be clearly assigned.

Data leak on Facebook partially reveals clear names, gender, and nationality.

The group promises a lot and actually changes a lot - but it doesn’t seem to benefit much. After the Graph Search has already been switched off in the past, which has now prevented anonymous searches by everyone, a database now appears containing around 419 million telephone numbers of Facebook accounts. But it goes beyond phone numbers. For some accounts, the data records also contain additional, personal information such as the clear name, gender and, in some cases, nationality. Who collected and stored the data and for what purpose? So far unknown. In any case, the database is no longer available.

Facebook confirms data theft with telephone numbers.

At that time it was possible to find users on Facebook by entering their telephone number. There were attack possibilities - in which one tried out numerous telephone numbers, and found the suitable accounts over it. The data theft of information which does not contain the password is nevertheless to be rated as critical. Extensive personal information makes it possible to take over identities. One example is SIM swapping.

What are the consequences of the data leak on Facebook?

In the end there will be another penalty for Facebook. But more important for users is the information that their own data has been stolen. In order to prevent fraud, common information should be updated. For this reason, it makes sense, for example, not always to fill out mandatory fields truthfully. Write down security questions and do not answer them with real data. If you need the answers one day, you should have them ready. Here a password safe is suitable - or a physical safe at home. Of course, you should also regularly think about whether you still use the social networks to the same extent. If not, it is also worth deleting your account. We have already written about numerous problems in our blog. These include, for example, the articles:

We have created a help function to make this easier when needed. Under cyberpflege everyone can see how easy or difficult, or even impossible, it is to unsubscribe from certain websites.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAVBSI

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung