Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » AT&T confirms data breach affecting nearly all wireless customers
Global Security

AT&T confirms data breach affecting nearly all wireless customers

AdminBy AdminJuly 13, 2024No Comments4 Mins Read
AT&T Data Breach
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


AT&T data leak

US communications service provider AT&T has confirmed that threat actors were able to access data belonging to “almost all” of its wireless customers, as well as mobile virtual network operator (MVNO) customers that use AT&T’s wireless network.

“Threat entities illegally accessed AT&T’s third-party cloud platform workspace and between April 14 and April 25, 2024, stole files containing AT&T records of customer call and text interactions that occurred between approximately May 1 and April 31 October 2022, as well as January 2, 2023,” the message reads said.

This includes the phone numbers with which AT&T wireless or MVNO numbers interacted, including the phone numbers of AT&T landline customers and customers of other carriers, the number of those interactions, and the total call duration per day or month.

A subset of these records also contained one or more cell site ID numbers, potentially allowing threat actors to triangulate a customer’s approximate location while making a call or sending a text message. AT&T said it would notify current and former customers if their information was involved.

Cyber ​​security

“The threat actors used data from previous hacks to match phone numbers to individuals,” said Jake Williams, a former NSA hacker and lecturer at IANS Research. “What the threat actors stole here are data records (CDRs), which are a gold mine in intelligence analysis because they can be used to understand who is talking to whom — and when.”

AT&T’s list of MVNOs includes Black Wireless, Boost Infinite, Consumer Cellular, Cricket Wireless, FreedomPop, FreeUp Mobile, Good2Go, H2O Wireless, PureTalk, Red Pocket, Straight Talk Wireless, TracFone Wireless, Unreal Mobile and Wing.

AT&T’s third-party cloud provider has not been named, but Snowflake has since confirmed that the breach was related to one that affected other customers such as Ticketmaster, Santander, Neiman Marcus and LendingTree. Bloomberg.

The company said it became aware of the incident on April 19, 2024 and took immediate action to respond. He also noted that he is cooperating with law enforcement in their efforts to arrest those involved and that “at least one person has been detained.”

404 mass media informed that a 24-year-old US citizen named John Binns, who was previously arrested in Turkey in May 2024, linked to a security event, citing three unnamed sources. In the US, he was also accused of hacking into T-Mobile in 2021 and selling customer data.

However, he emphasized that the information obtained does not include the content of calls or text messages, personal information such as social security numbers, dates of birth or other personal information.

“While the data does not include customer names, there are often ways to find a name associated with a particular phone number using publicly available online tools,” it said. said on Form 8-K filed with the U.S. Securities and Exchange Commission (SEC).

It also encourages users to watch out for phishing, smishing and online scams by only opening text messages from trusted senders. Additionally, customers can submit a request to retrieve the phone numbers of their calls and text messages in illegally downloaded data.

Cyber ​​security

The a malicious cyber campaign The targeting of Snowflake resulted in 165 customers being targeted, with Google-owned Mandiant attributing the activity to a financially motivated threat actor called UNC5537, which covers “members located in North America and working with an additional member in Turkey “.

Criminals have demanded payments of $300,000 to $5 million in exchange for stolen data. Recent developments show that the effects of cybercrime are expanding in scale and cascading.

WIRELESS revealed last month, as the hackers behind the Snowflake data thefts obtained stolen Snowflake credentials from dark web services that sell access to usernames, passwords and authentication tokens captured by the stealing malware. This included gaining access through a third-party contractor, EPAM Systems.

For her part, Snowflake this week announced that administrators can now enforce multi-factor authentication (MFA) for all users to reduce the risk of account hijacking. He also said that MFA will soon be required for all users on newly created Snowflake accounts.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.