Why Are AI Chatbots Leaking Your Phone Number?
AI chatbots are handing out real people's private phone numbers to total strangers — not through hacking, but through a flaw in how they were trained. One Reddit user started getting calls from people looking for a lawyer, a locksmith, and a product designer — all because Google's AI decided their n
AI chatbots — including Google's — are accidentally surfacing real people's private phone numbers when users ask them to find contact info for businesses or services. Your number could already be circulating to strangers right now, and you'd have no way of knowing until your phone starts ringing with calls meant for someone else — or worse, someone who wants to scam you.
The Real Case: A Reddit User's Phone Turned Into a Switchboard
This isn't theoretical. A Reddit user recently went public with a nightmare that started with a flood of bizarre phone calls. Strangers were ringing them looking for a lawyer. Then a locksmith. Then a product designer. The calls kept coming — all from people who had asked Google's AI chatbot for a phone number and received theirs instead.
Google's AI had apparently absorbed the victim's phone number from somewhere on the web and began serving it up as a contact number for unrelated businesses. The user had no relationship to any of these services. They just had the misfortune of having their number exist somewhere in the data the AI was trained on.
This is what researchers and privacy advocates are now calling 'AI-assisted doxxing' — except the AI isn't being malicious. It's just confidently wrong in a way that exposes real people to a firehose of strangers. And here's what makes this genuinely dangerous: fraudsters are already paying attention. A scammer who knows your number, your name, and that you're being mistaken for a service provider has everything they need to craft a targeted attack.
How AI Chatbots End Up Leaking Your Number
The mechanics here are less glamorous than a cyberattack, and that's exactly what makes them so hard to stop. Here's what's actually happening:
1. **Your number gets posted publicly.** Maybe you listed it on a business directory, a forum, a classified ad, a church website, or a LinkedIn profile years ago. You've long since forgotten it.
2. **An AI training crawler indexes it.** Companies like Google, OpenAI, and others train their models on massive sweeps of the public internet. Your number gets absorbed alongside the surrounding text — maybe near keywords like 'plumber,' 'attorney,' or 'repair.'
3. **The AI makes an association.** The model doesn't 'know' your number is private. It learned that numbers appear near certain types of businesses, so it treats yours as a legitimate answer when someone asks for a contact.
4. **Someone asks the chatbot for a phone number.** 'What's the number for a locksmith in [your city]?' The AI responds with yours — confidently, fluently, incorrectly.
5. **Strangers call you.** Most are just confused. But some are fraudsters who now have a verified live number attached to a real person.
The cruelest part: the AI has no mechanism to check whether the number is still accurate, private, or belongs to someone else. It just answers.
Why This Is More Dangerous Than It Sounds
Most people hear this story and think: 'Okay, annoying. Wrong number calls. Whatever.' That's the wrong reaction.
Here's the counterintuitive risk that guides aren't talking about: the people most likely to misuse AI-surfaced phone numbers aren't random scammers cold-dialing lists. They're targeted fraudsters who use the AI to build a profile on you first.
Think about it. If a scammer asks an AI chatbot for your number and gets it, they may also be asking: 'What does [your name] do professionally?' 'Is [your name] associated with any businesses?' 'What neighborhood is [business name] in?' AI chatbots will answer all of those questions using public data — and suddenly the scammer has your number, your approximate location, your professional background, and a pretext for calling you.
This is called 'social engineering enrichment,' and it's what turns a wrong-number glitch into a fraud pipeline.
There's also a psychological trap here: if someone calls you claiming to be a business you're apparently associated with in the AI's output, you'll be confused and disoriented. Confusion lowers your defenses. Scammers know this — disorientation is a tool, not an accident.
Your Defense Checklist: What to Do Right Now
Stop waiting for Google to fix this. Here's what you can actually do today:
**1. Google your own phone number immediately.** Put your number in quotes: `"555-867-5309"`. See every site that's published it. This takes three minutes and most people have never done it.
**2. Submit removal requests to data brokers.** Sites like Spokeo, WhitePages, BeenVerified, and Intelius are major sources for AI training data. Use their opt-out pages directly — or pay for a service like DeleteMe ($129/year) or Incogni (~$97/year) to do it automatically across 100+ brokers.
**3. Request removal from Google's search index.** Google has a 'Results About You' tool (myaccount.google.com/data-and-privacy) that lets you flag personal contact info for removal from search. Use it. It won't scrub the AI's memory instantly, but it reduces future exposure.
**4. Set up a Google Voice number for any public-facing use.** Give out the Google Voice number for classifieds, forums, or business directories. Keep your real number private. If the Voice number gets flooded, you can replace it without touching your actual line.
**5. If strange calls start, don't engage — document.** Note the date, time, and what the caller was looking for. Report to the FTC at ReportFraud.ftc.gov. If the pattern looks targeted rather than random, contact your carrier about temporary call filtering.
If you're still using your real number on public directories and haven't checked your Google search footprint, you're not protected — you're just lucky so far.
Key Takeaways
FAQ
Q: How do I find out if an AI chatbot is already sharing my phone number?
A: Search your phone number in quotes on Google, Bing, and also paste it directly into ChatGPT or Google Gemini asking 'what business is associated with this number?' — the results will tell you fast. If any chatbot returns a business name you're not connected to, you have confirmation and should start removal requests immediately.
Q: Can I force Google or OpenAI to remove my number from their AI's responses?
A: Honestly, this is the hard part — there's no direct 'delete me from the AI' button yet, and model retraining cycles mean your data can persist for months even after source pages are removed. Your best lever is Google's 'Results About You' tool for search removal, combined with data broker opt-outs to reduce the underlying sources the AI originally learned from.
Q: What should I do if I'm already getting strange calls meant for another business?
A: Document every call — date, time, what the caller wanted — and report the pattern to the FTC at ReportFraud.ftc.gov, then file a complaint directly with Google via their Search Console removal tool. If the calls feel targeted rather than random, tell your carrier and enable their built-in spam filtering (T-Mobile Scam Shield, AT&T ActiveArmor, and Verizon Call Filter are all free at the basic tier).
Conclusion
Your phone number is not as private as you think, and AI chatbots are now one of the fastest ways it ends up in a stranger's hands. The fix isn't complicated — but it requires you to act before the calls start, not after. Search your number in quotes on Google right now, then spend 15 minutes submitting opt-out requests to the three biggest data brokers: Spokeo, WhitePages, and BeenVerified. That one session could be the difference between a normal Tuesday and a week of fielding calls from people who think you're their locksmith.
Related Posts
- How Does AI Help Cybersecurity Teams — And How Do Attackers Abuse the Same Tools?
The same AI tools that help security teams detect threats in milliseconds are being weaponized to clone voices, generate perfect phishing emails, and impersonate executives on live video calls. This isn't a future risk — it already cost one company $25 million in a single afternoon. Here's exactly w - How Did 35,000 Users Get Hit by Phishing?
Between April 14–16, 2026, attackers posing as HR departments stole authentication tokens from 35,000 people across 26 countries — without ever needing their passwords. Standard two-factor authentication didn't stop it. Here's what actually will. - How Are AI Deepfakes Used in Romance Scams?
Romance scammers are now using real-time AI deepfake video and cloned voices to impersonate attractive strangers — and sometimes even your own family members. The technology costs less than $20/month and is shockingly convincing. Here's what the attack looks like and how to protect yourself today.