Cyberattackers could use the information to track users across devices, disable phone service, or intercept messages and phone calls.
Cyberattackers could use the information to track users across devices, disable phone service, or intercept messages and phone calls.