gettyimages 487867268
Image Credits:Adam Berry / Getty Images

A huge database of Facebook usersโ€™ phone numbers found online

Hundreds of millions of phone numbers linked to Facebook accounts have been found online.

The exposed server contained more than 419 million records over several databases on users across geographies, including 133 million records on U.S.-based Facebook users, 18 million records of users in the U.K., and another with more than 50 million records on users in Vietnam.

But because the server wasnโ€™t protected with a password, anyone could find and access the database.

Each record contained a userโ€™s unique Facebook ID and the phone number listed on the account. A userโ€™s Facebook ID is typically a long, unique and public number associated with their account, which can be easily used to discern an accountโ€™s username.

But phone numbers have not been public in more than a year since Facebook restricted access to usersโ€™ phone numbers.

TechCrunch verified a number of records in the database by matching a known Facebook userโ€™s phone number against their listed Facebook ID. We also checked other records by matching phone numbers against Facebookโ€™s own password reset feature, which can be used to partially reveal a userโ€™s phone number linked to their account.

Some of the records also had the userโ€™s name, gender and location by country.

Techcrunch event

Join 10k+ tech and VC leaders for growth and connections at Disrupt 2025

Netflix, Box, a16z, ElevenLabs, Wayve, Hugging Face, Elad Gil, Vinod Khosla โ€” just some of the 250+ heavy hitters leading 200+ sessions designed to deliver the insights that fuel startup growth and sharpen your edge. Donโ€™t miss the 20th anniversary of TechCrunch, and a chance to learn from the top voices in tech. Grab your ticket before doors open to save up to $444.

Join 10k+ tech and VC leaders for growth and connections at Disrupt 2025

Netflix, Box, a16z, ElevenLabs, Wayve, Hugging Face, Elad Gil, Vinod Khosla โ€” just some of the 250+ heavy hitters leading 200+ sessions designed to deliver the insights that fuel startup growth and sharpen your edge. Donโ€™t miss a chance to learn from the top voices in tech. Grab your ticket before doors open to save up to $444.

San Francisco | October 27-29, 2025
fb 3 2
A redacted set of records from the U.K. database. The โ€œ44โ€ indicates +44, the U.K.โ€™s country code and the โ€œ7โ€ indicates a cell phone number.

This is the latest security lapse involving Facebook data after a string of incidents since the Cambridge Analytica scandal, which saw more than 80 million profiles scraped to help identify swing voters in the 2016 U.S. presidential election.

Since then the company has seen several high-profile scraping incidents, including at Instagram, which recently admitted to having profile data scraped in bulk.

This latest incident exposed millions of usersโ€™ phone numbers just from their Facebook IDs, putting them at risk of spam calls and SIM-swapping attacks, which relies on tricking cell carriers into giving a personโ€™s phone number to an attacker. With someone elseโ€™s phone number, an attacker can force-reset the password on any internet account associated with that number.

Sanyam Jain, a security researcher and member of the GDI Foundation, found the database and contacted TechCrunch after he was unable to find the owner. After a review of the data, neither could we. But after we contacted the web host, the database was pulled offline.

Jain said he found profiles with phone numbers associated with several celebrities.

Facebook spokesperson Jay Nancarrow said the data had been scraped before Facebook cut off access to user phone numbers.

โ€œThis data set is old and appears to have information obtained before we made changes last year to remove peopleโ€™s ability to find others using their phone numbers,โ€ the spokesperson said. โ€œThe data set has been taken down and we have seen no evidence that Facebook accounts were compromised.โ€

Facebook later claimed the server contained โ€œabout 220 millionโ€ records.

But questions remain as to exactly who scraped the data, when it was scraped from Facebook and why.

Facebook has long restricted developersโ€˜ access to user phone numbers. The company also made it more difficult to search for friendsโ€™ phone numbers. But the data appeared to be loaded into the exposed database at the end of last month โ€” though that doesnโ€™t necessarily mean the data is new.

This latest data exposure is the most recent example of data stored online and publicly without a password. Although often tied to human error rather than a malicious breach, data exposures nevertheless represent an emerging security problem.

In recent months, financial giant First American left data exposed, as did MoviePass and the Senate Democrats.

Topics

, , , , , , , , , ,
Loading the next article
Error loading the next article
Can't support this form
To protect your security while using Google Translate, please do not submit information in this type of form.
Got itGo to original URL