{"id":40753,"date":"2021-05-06T14:28:21","date_gmt":"2021-05-06T14:28:21","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32265\/Your-Own-Phone-Number-Can-Be-Used-To-Hack-You-Study-Finds.html"},"modified":"2021-05-06T14:28:21","modified_gmt":"2021-05-06T14:28:21","slug":"your-own-phone-number-can-be-used-to-hack-you-study-finds","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/","title":{"rendered":"Your Own Phone Number Can Be Used To Hack You, Study Finds"},"content":{"rendered":"<div class=\"topic-callout\" readability=\"7.2888888888889\">\n<div class=\"topic-callout__img\"><a href=\"https:\/\/www.vice.com\/en\/topic\/cyber\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" alt=\"Screen Shot 2021-02-24 at 3\"><\/a><\/div>\n<p>Hacking. Disinformation. Surveillance. CYBER is Motherboard&#8217;s podcast and reporting on the dark underbelly of the internet.<\/p>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>According to FCC data, roughly 35 million phone numbers are disconnected every year. A new study has found that the majority of those numbers remain tied to the previous owner, opening the door to a variety of attacks that can put their former user at significant risk.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32.397565922921\"><\/p>\n<p>The <a href=\"https:\/\/recyclednumbers.cs.princeton.edu\/assets\/recycled-numbers-latest.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span>new study<\/span><\/a> by researchers at the Department of Computer Science and Center for Information Technology Policy at Princeton University sampled 259 phone numbers available to new subscribers at two major wireless carriers, and found that 171 were still tied to existing accounts at popular websites, creating significant privacy issues. Because of the way many online accounts are set up, it can be possible to hack an account as long as you have access to a phone number associated with it.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"36.856637168142\"><\/p>\n<p>Number recycling is a regulated telecom industry practice that maintains consistent availability of new ten-digit phone numbers as users switch phones and phone numbers, or discontinue accounts that are no longer needed.<\/p>\n<p>Studies <a href=\"https:\/\/amcdon.com\/papers\/phonenumbers-chi21.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span>had already found<\/span><\/a> that switching numbers opens the door to harassment, privacy abuses, and unwanted marketing. But the Princeton study found that carriers aren\u2019t doing enough at the point of sale to limit potentially significant abuse by third parties, and often provide inconsistent information to users about how the process works.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>\u201cAt carriers that allow for full numbers to be previewed\u2014either during signup or number change\u2014an attacker can \u2018scout out\u2019 a number by looking for linked accounts and owner history, all before obtaining the recycled number,\u201d the paper found.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"40.663900414938\"><\/p>\n<p>The study found there were up to <a href=\"https:\/\/recyclednumbers.cs.princeton.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span>eight different attacks<\/span><\/a> that could then be used to exploit phone number recycling, including personal identifiable information indexing (the use of people search services and phone numbers to gather additional personal information), phishing attacks, denial of service attacks, and account takeovers with or without authorized password reset.<\/p>\n<p>Researchers found that hackers don\u2019t even have to exploit software vulnerabilities, they simply have to peruse mobile carrier prepaid websites to go shopping for a phone number they\u2019re hoping to target. At Verizon, they found roughly a million phone numbers freely available for perusal online, with new numbers becoming available each month.&nbsp;<\/p>\n<p><\/span><span><\/p>\n<div class=\"adph adph--border\">\n<p>Advertisement<\/p>\n<\/div>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>\u201cWe found that the online interfaces in question imposed few restrictions on the adversary\u2019s ability to browse and obtain previously owned numbers for exploitation,\u201d they said.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>Researchers Arvind Narayanan and Kevin Lee also found that 100 of the 259 of the numbers examined in their sample set were associated with already-leaked login credentials circulating online, opening the door to attacks bypassing SMS-based multi-factor authentication.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"37.922651933702\"><\/p>\n<p>The researchers state that after being contacted, both Verizon and T-Mobile updated their customer support materials to remind customers that unused phone numbers may still be tied to online accounts, opening the door to abuse. <\/p>\n<p>\u201cUnfortunately, carriers imposed few restrictions on the adversary\u2019s ability to browse available numbers and acquire vulnerable ones,\u201d Narayanan <a href=\"https:\/\/twitter.com\/random_walker\/status\/1389282909656338434\" target=\"_blank\" rel=\"noopener noreferrer\"><span>said on Twitter<\/span><\/a>. \u201cAfter we disclosed the issue to them a few months ago, Verizon and T-mobile improved their documentation but have not made the attack harder.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34.353049907579\"><\/p>\n<p>The researchers found that carriers could further mitigate the threat by restricting unlimited phone number queries at their prepaid service websites, and forcing users to contact customer service instead of allowing the perusal of full phone numbers online.<\/p>\n<p>Narayanan and Lee noted that users looking to protect themselves should port their existing phone number over when switching devices, or store numbers they\u2019re no longer interested in using at number parking services like <a href=\"https:\/\/www.numberbarn.com\/number-parking\" target=\"_blank\" rel=\"noopener noreferrer\"><span>NumberBarn<\/span><\/a> or an internet voice service like Google Voice.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34.104046242775\"><\/p>\n<p>The failure to adequately police the abuse of recycled phone numbers is playing a role in <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-03-09\/apple-loses-push-to-move-consumer-privacy-suit-into-arbitration\" target=\"_blank\" rel=\"noopener noreferrer\"><span>an ongoing privacy lawsuit against Apple<\/span><\/a>, which alleges that a iOS flaw, combined with recycled T-Mobile phone numbers, provided third parties unauthorized access to users\u2019 communications, including both iMessages and Facetime calls.<\/p>\n<p>The study comes on the heels of a growing volume of research showing that text-message two-factor authentication simply isn\u2019t secure. Whether it\u2019s <a href=\"https:\/\/www.vice.com\/en\/article\/vbqax3\/hackers-sim-swapping-steal-phone-numbers-instagram-bitcoin\"><span>SIM hijacking<\/span><\/a> or the exploitation of existing SMS flaws to <a href=\"https:\/\/www.vice.com\/en\/article\/y3g8wb\/hacker-got-my-texts-16-dollars-sakari-netnumber\"><span>redirect sensitive text messages to third parties<\/span><\/a>, researchers say consumers are better off using email-based two-factor verification or authentication apps.<\/p>\n<p><\/span>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32265\/Your-Own-Phone-Number-Can-Be-Used-To-Hack-You-Study-Finds.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":40754,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8789],"class_list":["post-40753","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerphone"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your Own Phone Number Can Be Used To Hack You, Study Finds 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Own Phone Number Can Be Used To Hack You, Study Finds 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-06T14:28:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"240\" \/>\n\t<meta property=\"og:image:height\" content=\"238\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Your Own Phone Number Can Be Used To Hack You, Study Finds\",\"datePublished\":\"2021-05-06T14:28:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/\"},\"wordCount\":726,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg\",\"keywords\":[\"headline,hacker,phone\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/\",\"name\":\"Your Own Phone Number Can Be Used To Hack You, Study Finds 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg\",\"datePublished\":\"2021-05-06T14:28:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg\",\"width\":240,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/your-own-phone-number-can-be-used-to-hack-you-study-finds\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,phone\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerphone\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Your Own Phone Number Can Be Used To Hack You, Study Finds\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your Own Phone Number Can Be Used To Hack You, Study Finds 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/","og_locale":"en_US","og_type":"article","og_title":"Your Own Phone Number Can Be Used To Hack You, Study Finds 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-05-06T14:28:21+00:00","og_image":[{"width":240,"height":238,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Your Own Phone Number Can Be Used To Hack You, Study Finds","datePublished":"2021-05-06T14:28:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/"},"wordCount":726,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg","keywords":["headline,hacker,phone"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/","url":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/","name":"Your Own Phone Number Can Be Used To Hack You, Study Finds 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg","datePublished":"2021-05-06T14:28:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/05\/your-own-phone-number-can-be-used-to-hack-you-study-finds.jpg","width":240,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/your-own-phone-number-can-be-used-to-hack-you-study-finds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,phone","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerphone\/"},{"@type":"ListItem","position":3,"name":"Your Own Phone Number Can Be Used To Hack You, Study Finds"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=40753"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/40753\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/40754"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=40753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=40753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=40753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}