Anatomy of a Breach

Anatomy of a Breach: Facebook — 533 Million Phone Numbers and Personal Data Posted Free Online

> series: anatomy_of_a_breach —— part: 148 —— target: facebook —— records: 533,000,000 —— uk_records: ~11,000,000 —— price: free<span class="cursor-blink">_</span>_

Hedgehog Security 30 April 2021 12 min read

533 million records. 106 countries. Posted for free. Including 11 million UK records.

In April 2021, the personal data of approximately 533 million Facebook users from 106 countries was posted for free on a hacking forum. The data included phone numbers, full names, locations, dates of birth, email addresses, and biographical information. Approximately 11 million UK records were included. The data had originally been scraped from Facebook in 2019, exploiting a vulnerability in the platform's contact importer feature that allowed bulk lookups of phone numbers against user profiles.

Facebook (now Meta) argued that the data had been scraped rather than stolen through a traditional breach, and that the underlying vulnerability had been patched in 2019. But for the 533 million affected individuals, the distinction was academic: their personal data — including phone numbers, which are particularly valuable for targeted phishing, SIM-swapping attacks, and identity verification bypass — was now freely available to every criminal on the internet. The Irish DPC (Facebook's EU lead regulator) investigated and fined Meta €265 million for the underlying API vulnerability.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Phone numbers enable SIM-swapping, vishing, and MFA bypass.

Phone Numbers Are Sensitive Data
Phone numbers enable SIM-swapping attacks (taking over someone's phone number to intercept MFA codes), vishing (phone-based social engineering, as seen in the <a href="/blog/anatomy-of-a-breach-twitter-hack">Twitter hack</a>), and targeted smishing (SMS phishing). The 533 million phone numbers in this dump massively expanded the attack surface. <a href="/cyber-essentials">Cyber Essentials Danzell</a> recommends authenticator apps or hardware tokens over SMS-based MFA for this reason.
Posted for Free — Not Sold
Previous credential dumps were sold on dark web marketplaces. The Facebook 533M dataset was posted for free — eliminating even the minimal cost barrier to acquiring the data. <a href="https://www.socinabox.co.uk/blog/what-is-the-dark-web-business-guide">Dark web monitoring</a> through <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects when your organisation's data appears in public dumps.
API Scraping — Again
The data was collected through Facebook's API — the same pattern as <a href="/blog/anatomy-of-a-breach-cambridge-analytica">Cambridge Analytica</a> (2018). API abuse for data scraping continues to be a persistent threat. Our <a href="/penetration-testing/api">API penetration testing</a> assesses rate limiting, enumeration protection, and scraping defences.
€265 Million DPC Fine
The Irish DPC fined Meta €265 million for the API vulnerability that enabled the scraping — one of the largest GDPR fines imposed. Under UK GDPR, the ICO has equivalent enforcement powers. <a href="/cyber-essentials">Cyber Essentials</a> demonstrates the security measures that reduce regulatory exposure.

Scraped data becomes public data. Protect your APIs accordingly.

The Facebook 533M leak reinforced that data scraped through API vulnerabilities eventually becomes publicly available — harming individuals regardless of whether the collection is classified as a 'breach' or 'scraping.' For UK organisations, the lesson is to protect APIs against bulk scraping with the same rigour as traditional breach vectors. API penetration testing assesses scraping defences. Cyber Essentials mandates access controls. SOC in a Box monitors for API abuse patterns. And UK Cyber Defence provides incident response when data exposure is discovered.


533 million records scraped through an API and posted for free. Are your APIs protected against bulk scraping?

Our <a href="/penetration-testing/api">API testing</a> assesses scraping defences. <a href="/cyber-essentials">Cyber Essentials</a> mandates access controls. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for API abuse.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles