When people think about data breaches, they worry about passwords and credit card numbers. Those are serious, sure. But there's a piece of personal data that gets leaked just as often and causes long-term damage that's far harder to fix: your phone number.
You can change a password in 30 seconds. You can get a new credit card in a week. But changing your phone number? That means updating every account, notifying every contact, losing your two-factor authentication setups, and potentially missing calls from doctors, schools, and employers for months. Most people don't do it. And data thieves know that.
The Breaches That Exposed Billions of Phone Numbers
The scale of phone number exposure in recent years is staggering. These aren't hypothetical risks — these are breaches that already happened, with data that's already circulating.
T-Mobile (2021-2023)
T-Mobile has been breached so many times it's hard to keep count. The August 2021 breach exposed personal data of 76.6 million people, including phone numbers, names, dates of birth, Social Security numbers, and driver's license information. In January 2023, another breach hit 37 million customers, exposing names, billing addresses, phone numbers, and account details. Then in early 2023, a third incident affected roughly 836 customers but included highly detailed personal information including PINs.
T-Mobile agreed to a $500 million settlement for the 2021 breach — $350 million to affected customers and $150 million for security upgrades. If you were a T-Mobile customer between 2018 and 2023, your phone number is almost certainly in multiple breached datasets.
AT&T (2024)
In March 2024, AT&T acknowledged that a dataset containing personal information of 73 million current and former customers had been published on the dark web. The data included phone numbers, Social Security numbers, email addresses, mailing addresses, and account details. AT&T initially denied the data was theirs when it first surfaced in 2021, only confirming the breach three years later.
Then in July 2024, AT&T disclosed a separate breach where hackers accessed call and text records of nearly all AT&T cellular customers — approximately 110 million people. While the content of calls and texts wasn't exposed, the metadata — who you called, when, and how often — was.
National Public Data (2024)
This one is the worst. National Public Data, a background check company, suffered a breach that exposed approximately 2.9 billion records affecting an estimated 170 million people. The stolen data included names, addresses spanning 30+ years, Social Security numbers, and phone numbers. The breach was so severe that National Public Data filed for bankruptcy in October 2024.
What makes this breach particularly devastating is the source: this wasn't a phone carrier or social media company. This was a data aggregator — a company that collected information from public records, court filings, voter registrations, and other sources specifically to build comprehensive profiles on individuals. The breach didn't just expose your current phone number; it exposed your history.
Other Notable Breaches
- Facebook (2021): 533 million users' phone numbers and personal data posted publicly on a hacking forum
- LinkedIn (2021): Data from 700 million users scraped and sold, including phone numbers tied to professional profiles
- Twitch (2021): Full source code and user data leaked, including linked phone numbers
- Cash App (2022): 8.2 million users' data exposed, including phone numbers and account information
What Happens After Your Number Is Breached
A breached phone number doesn't just sit in a file on a hacker's computer. It enters a distribution network that amplifies the damage over time.
Phase 1: Initial sale (days to weeks). The stolen dataset gets sold on dark web marketplaces. Full datasets from major breaches typically sell for $10,000 to $100,000 depending on the quality and freshness. Individual records with phone numbers, names, and SSNs can go for $5 to $20 each.
Phase 2: Enrichment (weeks to months). Buyers cross-reference the breached data with other sources — data broker profiles, social media accounts, other breach datasets — to build richer profiles. Your phone number gets linked to your home address, email, employer, family members, and purchasing habits.
Phase 3: Exploitation (months to years). The enriched data gets used for targeted phishing via SMS (smishing), social engineering attacks, SIM swap fraud, identity theft, and — most commonly — spam call targeting. Your number ends up on dozens of telemarketing and scam call lists.
Phase 4: Permanent circulation. Breached data never disappears. It gets copied, resold, repackaged, and combined with newer breaches indefinitely. Phone numbers from the 2017 Equifax breach are still actively used in spam campaigns today.
Why Phone Numbers Are Uniquely Dangerous
Your phone number is a skeleton key to your digital life in ways that aren't immediately obvious:
- Two-factor authentication: Most accounts use SMS-based 2FA. If an attacker has your number and can execute a SIM swap, they can intercept your verification codes and access your email, banking, and social media accounts.
- Account recovery: "Forgot your password? We'll text you a code." Your phone number is the recovery method for dozens of accounts you've probably forgotten about.
- Identity verification: Banks, insurance companies, and government agencies routinely use phone-based verification. "We'll call you to confirm your identity" is only secure if your number hasn't been compromised.
- Social engineering seed: A scammer who calls you and already knows your name, address, and the last four digits of your SSN (all from breach data) is far more convincing than a random robocall.
How to Check If Your Number Has Been Exposed
There's no single source that tracks all breach exposure, but you can start with these steps:
- HaveIBeenPwned.com: Troy Hunt's free service checks your email address against known breaches. While it doesn't directly search phone numbers, many of the breaches it tracks included phone data. If your email was in the T-Mobile or AT&T breach, your phone number was too.
- Check your carrier: T-Mobile, AT&T, and other carriers set up dedicated breach notification pages. Check if you were included in their specific incidents.
- Search data broker sites: Go to Whitepages.com, Spokeo.com, BeenVerified.com, and TruePeopleSearch.com. Search your phone number. If your full name, address, and personal details come up, that data is accessible to anyone — including scammers who buy bulk access to these databases.
- Monitor your spam call volume: A sudden spike in spam calls often indicates your number was recently included in a newly distributed breach dataset or sold to new lead generation firms.
What to Do After a Breach
If you know or suspect your phone number was exposed in a breach, take these steps immediately:
- Switch to app-based 2FA. Move every account you can from SMS verification to an authenticator app like Google Authenticator, Authy, or a hardware key like YubiKey. This neutralizes the SIM swap risk.
- Add a PIN to your carrier account. All major carriers allow you to set an account PIN or passphrase that must be provided before any changes — including SIM swaps or number ports — can be processed. Do this today.
- File an FTC complaint at reportfraud.ftc.gov if you're receiving spam calls. This contributes to enforcement actions and helps establish patterns.
- Opt out of data brokers. This is the most time-consuming but most impactful step. Each broker has its own opt-out process. Whitepages requires you to find your listing, verify via phone, and submit a removal request. Spokeo requires an email to their opt-out page. BeenVerified has an online form. TruePeopleSearch has a removal page but may re-list you from other public record sources. You need to do all of them, and you need to re-check periodically because new data imports can re-add your information.
- Get a comprehensive exposure audit. Individual checks are a start, but they don't give you the full picture. A thorough audit checks your number against data broker databases, breach records, public records, and spam caller databases simultaneously to show you exactly where you're exposed and what to do about each exposure point.
The Long Tail of a Data Breach
Here's the uncomfortable truth: if your phone number was exposed in any of the major breaches listed above, it's already too late to prevent the initial exposure. That data is out there. What you can control is how much additional information is connected to your number and how easy it is for bad actors to exploit it.
Reducing your data broker footprint, strengthening your account security, and understanding your specific exposure profile are the most effective things you can do. You can't un-breach the data, but you can make your number a harder target.
Check If Your Phone Number Is Circulating
Your Phone Protection Report checks your number against data broker databases, known breach records, and spam risk indicators — so you know exactly where you're exposed and what to do about it.
Get Your Report — $20