• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
at&t confirms data breach affecting nearly all wireless customers

AT&T Confirms Data Breach Affecting Nearly All Wireless Customers

You are here: Home / General Cyber Security News / AT&T Confirms Data Breach Affecting Nearly All Wireless Customers
July 13, 2024

American telecom provider provider AT&T has confirmed that risk actors managed to entry details belonging to “almost all” of its wi-fi consumers as perfectly as customers of cell digital network operators (MVNOs) employing AT&T’s wi-fi network.

“Threat actors unlawfully accessed an AT&T workspace on a third-party cloud platform and, concerning April 14 and April 25, 2024, exfiltrated information made up of AT&T records of client connect with and textual content interactions that transpired amongst about Might 1 and October 31, 2022, as nicely as on January 2, 2023,” it explained.

This contains telephone figures with which an AT&T or MVNO wi-fi quantity interacted – like telephone figures of AT&T landline shoppers and consumers of other carriers, counts of all those interactions, and aggregate get in touch with duration for a day or thirty day period.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


A subset of these documents also contained a person or a lot more mobile web-site identification figures, perhaps allowing for the menace actors to triangulate the approximate area of a customer when a contact was manufactured or a text information was sent. AT&T stated it will notify current and previous prospects if their details was concerned.

Cybersecurity

“The threat actors have made use of information from earlier compromises to map phone quantities to identities,” Jake Williams, former NSA hacker and college at IANS Research, mentioned. “What the menace actors stole listed here are efficiently phone knowledge data (CDR), which are a gold mine in intelligence assessment simply because they can be applied to understand who is chatting to who — and when.”

AT&T’s listing of MVNOs consists of Black Wi-fi, Raise Infinite, Buyer Cellular, Cricket Wireless, FreedomPop, FreeUp Cell, Fantastic2Go, H2O Wi-fi, PureTalk, Purple Pocket, Straight Converse Wireless, TracFone Wireless, Unreal Cellular, and Wing.

The identify of the third-party cloud company was not disclosed by AT&T, but Snowflake has due to the fact confirmed that the breach was related to the hack which is impacted other buyers, these kinds of as Ticketmaster, Santander, Neiman Marcus, and LendingTree, in accordance to Bloomberg.

The firm claimed it grew to become knowledgeable of the incident on April 19, 2024, and straight away activated its reaction efforts. It even further noted that it’s operating with legislation enforcement in their initiatives to arrest those people included, and that “at minimum a person particular person has been apprehended.”

404 Media documented that a 24-year-aged U.S. citizen named John Binns, who was beforehand arrested in Turkey in Could 2024, is linked to the security party, citing three unnamed sources. He was also indicted in the U.S. for infiltrating T-Cell in 2021 and selling its buyer information.

Having said that, it emphasized that the accessed details does not include things like the information of phone calls or texts, own information and facts these kinds of as Social Security figures, dates of beginning, or other individually identifiable information.

“Though the information does not contain customer names, there are often methods, making use of publicly obtainable on line instruments, to locate the name connected with a certain telephone quantity,” it reported in a Form 8-K submitting with the U.S. Securities and Trade Commission (SEC).

It really is also urging end users to be on the lookout for phishing, smishing, and on-line fraud by only opening text messages from trusted senders. On top of that, clients can submit a request to get the phone quantities of their calls and texts in the illegally downloaded facts.

Cybersecurity

The destructive cyber marketing campaign focusing on Snowflake has landed as a lot of as 165 prospects in the crosshairs, with Google-owned Mandiant attributing the activity to a fiscally determined danger actor dubbed UNC5537 that encompasses “users based mostly in North The united states, and collaborates with an more member in Turkey.”

The criminals have demanded payments of involving $300,000 and $5 million in return for the stolen facts. The newest progress demonstrates that the fallout from the cybercrime spree is growing in scope and has experienced a cascading impact.

WIRED unveiled previous thirty day period how the hackers at the rear of the Snowflake info thefts procured stolen Snowflake credentials from dark web solutions that market entry to usernames, passwords, and authentication tokens that are captured by stealer malware. This included getting access through a third-party contractor named EPAM Devices.

For its part, Snowflake this 7 days announced that directors can now enforce required multi-factor authentication (MFA) for all end users to mitigate the risk of account takeovers. It also mentioned it will quickly require MFA for all buyers in newly designed Snowflake accounts.

Uncovered this article fascinating? Comply with us on Twitter  and LinkedIn to examine extra unique information we write-up.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «darkgate malware exploits samba file shares in short lived campaign DarkGate Malware Exploits Samba File Shares in Short-Lived Campaign
Next Post: New HardBit Ransomware 4.0 Uses Passphrase Protection to Evade Detection new hardbit ransomware 4.0 uses passphrase protection to evade detection»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.