Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Call Records of Millions Exposed by Verizon App Vulnerability
  • Security Week

Call Records of Millions Exposed by Verizon App Vulnerability

Eduard Kovacs Published: April 4, 2025 | Updated: April 4, 2025 3 min read
0 views

A vulnerability found in a Verizon mobile application could have been exploited to harvest the call records of millions of Americans, according to the researcher who found the flaw.

The vulnerability was discovered by cybersecurity researcher Evan Connelly in Verizon Call Filter, an iPhone application that allows users to identify suspected spam calls and automatically block such calls. 

The issue was reported to Verizon on February 22. It was patched by the third-party owner of the application in mid-March, Verizon told SecurityWeek. 

Connelly discovered that when the app displayed the user’s incoming call history, it made a request to a server which provided the information. That request contained the user’s phone number and the timeframe for which the call records were requested.

However, the endpoint the requests were sent to failed to check that the phone number specified in the request actually belonged to the user. This could have enabled an attacker to send a request to the vulnerable endpoint with an arbitrary phone number to obtain incoming call records for that number.

No other information beyond phone numbers and timestamps associated with incoming calls appears to have been exposed.

Connelly did not determine whether the flaw could have been exploited against any Verizon customer or just users who have the Verizon Call Filter service enabled.

“I believe this service may be on by default for many/all Verizon Wireless customers, so in either case, it does seem this issue impacted either nearly all, or all customers,” the researcher said in a blog post.   

Advertisement. Scroll to continue reading.

Verizon has over 140 million subscribers and its statement does not indicate that the company is disputing the researcher’s claims about millions of users potentially being impacted by the vulnerability. 

“Call metadata might seem harmless, but in the wrong hands, it becomes a powerful surveillance tool. With unrestricted access to another user’s call history, an attacker could reconstruct daily routines, identify frequent contacts, and infer personal relationships,” the researcher said.

“Timestamps can be cross-referenced with social media or public sightings to map physical movements. Repeated numbers expose private or burner lines, compromising whistleblowers, journalists, or abuse survivors,” he added. 

A recent China-linked hacking campaign targeting several telecom companies has shown that call data may be valuable to threat actors.

“While there was no indication that the flaw was exploited, the issue was resolved and only impacted iOS devices. Verizon appreciates the responsible disclosure of the finding by the researcher and takes the security very seriously,” Verizon said in a statement.

As for Verizon mentioning that the vulnerable application is developed by a third party, Connelly’s research indeed indicates that the Verizon Call Filter app is made by Cequint, a company focusing on caller ID services. 

Connelly previously discovered a vulnerability in a Tesla tool that could have been exploited to take over accounts of former employees.

Related: Halo ITSM Vulnerability Exposed Organizations to Remote Hacking

Related: Abandoned Amazon S3 Buckets Could Have Enabled Attacks Against Governments, Big Firms

Related: Critical Apache Parquet Vulnerability Leads to Remote Code Execution

About The Author

Eduard Kovacs

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: In Other News: Apple Improving Malware Detection, Cybersecurity Funding, Cyber Command Chief Fired
Next: Cyber Forensic Expert in 2,000+ Cases Faces FBI Probe

Author's Other Posts

China Admitted to US That It Conducted Volt Typhoon Attacks: Report Treasury-Hacked-China.jpg

China Admitted to US That It Conducted Volt Typhoon Attacks: Report

April 11, 2025 0 0
GitHub Announces General Availability of Security Campaigns GitHub.jpeg

GitHub Announces General Availability of Security Campaigns

April 10, 2025 0 0
Nissan Leaf Hacked for Remote Spying, Physical Takeover Nissan-Leaf.png

Nissan Leaf Hacked for Remote Spying, Physical Takeover

April 10, 2025 0 0
Operations of Sensor Giant Sensata Disrupted by Ransomware Attack Ransomware-attacks.jpg

Operations of Sensor Giant Sensata Disrupted by Ransomware Attack

April 10, 2025 0 2

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.