Data Protection
Data breach stock image
iStock

Millions of Americans caught up in massive SMS data leak

Names, email addresses, passwords, phone numbers and more exposed by leaky TrueDialog server.

Like GearBrain on Facebook

The private details of millions of Americans were left exposed for anyone to see on a massive database of text messages held by TrueDialog.

Based in Austin, Texas, 10-year-old TrueDialog works with over 900 cell phone operators, who use the service to contact more than five billion people globally. Services offered by TrueDialog include ways for companies to send out text messages en masse to customers, or in a bid to pick up new business. As well as marketing, TrueDialog's services are used by emergency alert systems and an education SMS solution.

Read More:

The leaky server, which contained millions of unencrypted messages, was discovered by cybersecurity company vpnMentor, and not protected by a password. Anyone could view the text messages held by the server, then use the private information to conduct phishing campaigns, or sell the data to other parties.


In addition to text messages, researchers at vpnMentor discovered millions of account usernames and passwords belonging to TrueDialog's clients and their customers.

vpnMentor reports how the insecure database was discovered on November 26. Two days later, researchers contacted TrueDialog about the problem, and despite receiving no reply, the server was secured a day later, on November 29.

TrueDialogTrueDialog is a 10-yea-company based in Austin, TexasTrueDialog

"When we last looked at the database, it included 604 GB of data, "vpnMentor said in a blog post published December 2, adding: "This included nearly one billion entries of highly sensitive data".

TrueDialog has not yet publicly commented on the server. GearBrain has requested a comment from TrueDialog, and we will update this article when we receive a reply.

The server was discovered as part of a huge web mapping project undertaken by vpnMentor. The system scans servers online and tests access ports that may lead to vulnerabilities. When a weakness is found, the company works to identify the database's identity and alerts the owner. In this case, the server was completely unsecured and unencrypted.

The blog added: "It's difficult to put the size of this data leak into context. Hundreds of millions of people were potentially exposed in several ways. It's rare for one database to contain such a huge volume of information that's also incredibly varied."

The database contained details on TrueDialog's business model, client base, customers, and text messages sent to end users. Some passwords were stored in clear text, and others were base64 encoded, but vpnMentor said they are still "easy to decrypt."

Data exposed by the unprotected server include:

  • Full names of recipients, TrueDialog account holders, and TrueDialog users
  • Content of messages
  • Email addresses
  • Phone numbers of recipients and users
  • Dates and times messages were sent
  • Status indicators on messages, like read receipts
  • TrueDialog account details

vpnMentor added: "The impact of this data leak can have a lasting impression for hundreds of millions of users. The available information can be sold to both marketers and spammers."

In addition to affecting customers, the leak could have led to rivals learning how TrueDialog's business works. The vpnMentor blog post explains: "Their competitors could have gotten a look into their backend and seen how the company is run from within. This would have allowed them to copy or improve upon the business model that has brought TrueDialog success.... Their competitors can also take advantage of the bad publicity the brand is going to receive and even take over their customers."

There are also concerns over account takeover, corporate espionage, a loss of income and new leads, identity theft and fraud, phishing and phone or email scams, and blackmail.

This is an example of how regular consumers are put at risk through no fault of their own. All affected users can do is remain vigilant and look out for suspicious communication, such as text messages, emails, and phone calls. These may have come from a malicious company that has stolen their details from the leaking server.


Like GearBrain on Facebook
The Conversation (0)

GearBrain Compatibility Find Engine

A pioneering recommendation platform where you can research, discover, buy, and learn how to connect and optimize smart devices.

Join our community! Ask and answer questions about smart devices and save yours in My Gear.

Top Stories

Weekly Deals