Vodafone Data Breach
Vodafone Iceland Telecom Breach (2013): Customer SSN, Credit Card Data, SMS Messages & Passwords Exposed via Turkish Hackers
Global telecommunications provider offering mobile, broadband, and enterprise services.
Risk Interpretation
Severe risk of SIM swap fraud, phishing, account takeover, and identity theft. Telecom records are high-value because they support both direct fraud and broader account recovery abuse.
Impact & Downstream Threats
The institutional impact of the 2013 attack on Vodafone Iceland was severe in the local context. The company initially denied that confidential customer data had been compromised, then publicly retracted that denial within twenty-four hours and apologized after the leak's contents became visible to anyone with the rar-file password. The breach drew significant Icelandic media attention because exposed SMS records included correspondence between Icelandic politicians, some of which was politicall
- Credential stuffing against reused passwords across other platforms
- Financial fraud using exposed financial profile data
- Identity theft and synthetic identity construction using government-issued IDs
- SIM swap attacks where phone numbers are present
- Targeted phishing campaigns using exposed email addresses
- Doxxing risk from physical address exposure
Threat Vectors
Breach Intelligence
Executive Summary
Vodafone Iceland, the Icelandic affiliate of the Vodafone Group, was breached on November 30, 2013 by the Turkish hacktivist collective Maxn3y, also operating under the handle Agent. The attackers defaced the company's website and posted a 61.7-megabyte archive containing SQL dumps of customer database tables. The archive included user accounts, SMS history files, multimedia tracking logs, and account-manager records. Vodafone Iceland initially denied that confidential data had been exposed and retracted the denial within twenty-four hours after public review of the dump confirmed otherwise.\n\nThe published dataset covered approximately 56,000 unique email addresses, with related accounts spanning a larger total of around 77,000 records. Compromised fields included usernames, email addresses, names, physical addresses, phone numbers, IP addresses, encrypted passwords, government identifiers (Iceland's kennitala national ID number), credit card data, purchase records, and SMS message content. The SMS dump dated to 2011 and included correspondence among Icelandic politicians, some of it politically sensitive, which drew local media attention beyond standard breach coverage.\n\nFor affected individuals, the practical risk profile is distinct because of the inclusion of message content alongside identity and financial fields. The kennitala is a stable government identifier used widely in Iceland for identity verification, banking, and tax purposes, and combined with name, address, and date of birth it supports identity-verification bypass long after the original disclosure. Credit card data exposed in the original dump is no longer current, but historical SMS message content involving named individuals creates lasting reputational risk. Anyone who held a Vodafone Iceland account during the affected period should treat their kennitala and historical contact data as exposed, monitor for unusual financial activity, and remain alert to any unsolicited contact referencing past Vodafone services.
About Vodafone
Vodafone Iceland, operating at vodafone.is, is the Icelandic affiliate of the Vodafone Group, the global telecommunications operator headquartered in the United Kingdom. The Iceland operation provides mobile, broadband, and television services to Icelandic households and businesses. The customer base is necessarily small in absolute terms given Iceland's total population of around 330,000 at the time, which made the 2013 breach unusually large in proportional terms relative to the country. The company maintains the typical telecom customer record set including subscriber identity, contact details, billing data, device information, and service-management records.
Why They Hold Your Data
Mobile network operators collect customer identity, phone numbers, addresses, billing data, device and SIM information, and service records across telecom operations.
Recent Developments
Vodafone Iceland continued to operate following the 2013 incident and has not been publicly tied to a further large-scale breach disclosure. The Vodafone Group has continued to face periodic data-protection scrutiny across its international operations, but no incident at the Iceland affiliate has matched the 2013 attack in scale or sensitivity. The 2013 dataset has periodically resurfaced on data-trading forums in the years since, often re-shared as part of broader compilations of legacy telecom breaches. Iceland's national data-protection authority, Persónuvernd, has continued to operate under updated EU-aligned data-protection law since the original incident.
Data Points Exposed
Exposure Categories
Canonical Fields
credit_card, email_address, full_name, government_id, ip_address, messages_and_chat:sms_message, password, phone_number, physical_address, transaction_history:purchase, username
Dark Web Verification
- Dataset containing ~56K records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: Vodafone Data Breach
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Vodafone
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
