Cyberattackers could use the information to track users across devices, disable phone service, or intercept messages and phone calls.
Source: Threadpost