• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
at&t confirms data breach affecting nearly all wireless customers

AT&T Confirms Data Breach Affecting Nearly All Wireless Customers

You are here: Home / General Cyber Security News / AT&T Confirms Data Breach Affecting Nearly All Wireless Customers
July 13, 2024

American telecom provider provider AT&T has confirmed that risk actors managed to entry details belonging to “almost all” of its wi-fi consumers as perfectly as customers of cell digital network operators (MVNOs) employing AT&T’s wi-fi network.

“Threat actors unlawfully accessed an AT&T workspace on a third-party cloud platform and, concerning April 14 and April 25, 2024, exfiltrated information made up of AT&T records of client connect with and textual content interactions that transpired amongst about Might 1 and October 31, 2022, as nicely as on January 2, 2023,” it explained.

This contains telephone figures with which an AT&T or MVNO wi-fi quantity interacted – like telephone figures of AT&T landline shoppers and consumers of other carriers, counts of all those interactions, and aggregate get in touch with duration for a day or thirty day period.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


A subset of these documents also contained a person or a lot more mobile web-site identification figures, perhaps allowing for the menace actors to triangulate the approximate area of a customer when a contact was manufactured or a text information was sent. AT&T stated it will notify current and previous prospects if their details was concerned.

Cybersecurity

“The threat actors have made use of information from earlier compromises to map phone quantities to identities,” Jake Williams, former NSA hacker and college at IANS Research, mentioned. “What the menace actors stole listed here are efficiently phone knowledge data (CDR), which are a gold mine in intelligence assessment simply because they can be applied to understand who is chatting to who — and when.”

AT&T’s listing of MVNOs consists of Black Wi-fi, Raise Infinite, Buyer Cellular, Cricket Wireless, FreedomPop, FreeUp Cell, Fantastic2Go, H2O Wi-fi, PureTalk, Purple Pocket, Straight Converse Wireless, TracFone Wireless, Unreal Cellular, and Wing.

The identify of the third-party cloud company was not disclosed by AT&T, but Snowflake has due to the fact confirmed that the breach was related to the hack which is impacted other buyers, these kinds of as Ticketmaster, Santander, Neiman Marcus, and LendingTree, in accordance to Bloomberg.

The firm claimed it grew to become knowledgeable of the incident on April 19, 2024, and straight away activated its reaction efforts. It even further noted that it’s operating with legislation enforcement in their initiatives to arrest those people included, and that “at minimum a person particular person has been apprehended.”

404 Media documented that a 24-year-aged U.S. citizen named John Binns, who was beforehand arrested in Turkey in Could 2024, is linked to the security party, citing three unnamed sources. He was also indicted in the U.S. for infiltrating T-Cell in 2021 and selling its buyer information.

Having said that, it emphasized that the accessed details does not include things like the information of phone calls or texts, own information and facts these kinds of as Social Security figures, dates of beginning, or other individually identifiable information.

“Though the information does not contain customer names, there are often methods, making use of publicly obtainable on line instruments, to locate the name connected with a certain telephone quantity,” it reported in a Form 8-K submitting with the U.S. Securities and Trade Commission (SEC).

It really is also urging end users to be on the lookout for phishing, smishing, and on-line fraud by only opening text messages from trusted senders. On top of that, clients can submit a request to get the phone quantities of their calls and texts in the illegally downloaded facts.

Cybersecurity

The destructive cyber marketing campaign focusing on Snowflake has landed as a lot of as 165 prospects in the crosshairs, with Google-owned Mandiant attributing the activity to a fiscally determined danger actor dubbed UNC5537 that encompasses “users based mostly in North The united states, and collaborates with an more member in Turkey.”

The criminals have demanded payments of involving $300,000 and $5 million in return for the stolen facts. The newest progress demonstrates that the fallout from the cybercrime spree is growing in scope and has experienced a cascading impact.

WIRED unveiled previous thirty day period how the hackers at the rear of the Snowflake info thefts procured stolen Snowflake credentials from dark web solutions that market entry to usernames, passwords, and authentication tokens that are captured by stealer malware. This included getting access through a third-party contractor named EPAM Devices.

For its part, Snowflake this 7 days announced that directors can now enforce required multi-factor authentication (MFA) for all end users to mitigate the risk of account takeovers. It also mentioned it will quickly require MFA for all buyers in newly designed Snowflake accounts.

Uncovered this article fascinating? Comply with us on Twitter  and LinkedIn to examine extra unique information we write-up.


Some sections of this report are sourced from:
thehackernews.com

Previous Post: «darkgate malware exploits samba file shares in short lived campaign DarkGate Malware Exploits Samba File Shares in Short-Lived Campaign
Next Post: New HardBit Ransomware 4.0 Uses Passphrase Protection to Evade Detection new hardbit ransomware 4.0 uses passphrase protection to evade detection»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
  • Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
  • The Hidden Weaknesses in AI SOC Tools that No One Talks About
  • Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
  • Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
  • North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.