{"id":24260,"date":"2024-04-15T08:34:44","date_gmt":"2024-04-15T16:34:44","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/04\/15\/news-17990\/"},"modified":"2024-04-15T08:34:44","modified_gmt":"2024-04-15T16:34:44","slug":"news-17990","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2024\/04\/15\/news-17990\/","title":{"rendered":"AT&#038;T confirms 73 million people affected by data breach"},"content":{"rendered":"\n<p>Telecommunications giant AT&amp;T has <a href=\"https:\/\/about.att.com\/story\/2024\/addressing-data-set-released-on-dark-web.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">finally confirmed<\/a> that 73 million current and former customers have been caught up in a <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/03\/the-att-breach-what-you-need-to-know\">massive dark web data leak<\/a>. The leaked data includes names, addresses, mobile phone numbers, dates of birth, and social security numbers. <\/p>\n<p>Malwarebytes VP of Consumer Privacy, Oren Arar, describes the AT&amp;T breach as &#8220;especially risky&#8221; because much of the type of data that&#8217;s been exposed. &#8220;SSN, name, date of birth\u2014this is personal identifiable information (PII) that cannot be changed, and if scammers gets their hands on it, it just makes their work in stealing peoples identities a lot easier.&#8221;<\/p>\n<p>The data came to light a few weeks ago when it was put up for sale on an online cybercrime forum, but the seller, a hacker calling themselves &#8220;MajorNelson&#8221;, claimed it had been stolen from AT&amp;T three years prior.<\/p>\n<p>In 2021, a hacker named &#8220;Shiny Hunters&#8221; put a database apparently containing the personal details of 70 million AT&amp;T customers up for sale, but AT&amp;T denied the leak was its data, and denied it again when the data appeared on the dark web last month. It has since revised its position as it wrestles with the thorny problem of investigating what happened on its computers three years ago.<\/p>\n<p>In its latest statement, the company confirmed that the leak contained &#8220;AT&amp;T data-specific fields,&#8221; but said it had not yet determined the source of that data. <\/p>\n<blockquote class=\"wp-block-quote\">\n<p>AT&amp;T has determined that AT&amp;T data-specific fields were contained in a data set released on the dark web approximately two weeks ago.&nbsp;While AT&amp;T has made this determination, it is not yet known whether the data in those fields originated from AT&amp;T or one of its vendors. With respect to the balance of the data set, which includes personal information such as social security numbers, the source of the data is still being assessed.<\/p>\n<\/blockquote>\n<p>However, it also said that it believes that the leak affects 7.6 million current customers, and the leaked data is &#8220;from 2019 or earlier&#8221;.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>Based on our preliminary analysis, the data set appears to be from 2019 or earlier, impacting approximately 7.6 million current AT&amp;T account holders and approximately 65.4 million former account holders.<\/p>\n<\/blockquote>\n<p>In a separate statement, the company also said it is <a href=\"https:\/\/www.att.com\/support\/article\/my-account\/000101995?bypasscache=1https:\/\/www.att.com\/support\/article\/my-account\/000101995?bypasscache=1\/?source=EPcc000000000000U\">reaching out to the people affected by the breach<\/a>.<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>It has come to our attention that a number of AT&amp;T passcodes have been compromised. We are reaching out to all 7.6M impacted customers and have reset their passcodes. In addition, we will be communicating with current and former account holders with compromised sensitive personal information.<\/p>\n<\/blockquote>\n<p>Personal information like names, addresses, phone numbers, passcodes, and social security numbers are prized assets for cybercriminals because they can be used to make scams much more believable.<\/p>\n<p>In particular, this information will make it easier for criminals to pose as AT&amp;T, and all 73 million people affected by this breach will need to be on their guard for scammers using it as a pretext to send personalised, AT&amp;T-branded emails and messages. <\/p>\n<h2 class=\"wp-block-heading\" id=\"h-protecting-yourself-from-a-data-breach\">Protecting yourself from a data breach<\/h2>\n<p>There are some actions you can take if you are, or suspect you may have been, the <a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2023\/09\/involved-in-a-data-breach-heres-what-you-need-to-know\">victim of a data breach<\/a>.<\/p>\n<ul>\n<li><strong>Check the vendor&#8217;s advice.<\/strong> Every breach is different, so check with the vendor to find out what&#8217;s happened, and follow any specific advice they offer.<\/li>\n<li><strong>Change your password.<\/strong> You can make a stolen password useless to thieves by changing it. Choose a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/computer\/how-to-create-a-strong-password\" target=\"_blank\">strong password<\/a>&nbsp;that you don&#8217;t use for anything else. Better yet, let a&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\" target=\"_blank\">password manager<\/a>&nbsp;choose one for you.<\/li>\n<li><strong>Enable two-factor authentication (2FA).<\/strong> If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\" target=\"_blank\">two-factor authentication (2FA)<\/a>&nbsp;can be phished just as easily as a password. 2FA that relies on a FIDO2 device can\u2019t be phished.<\/li>\n<li><strong>Watch out for fake vendors.<\/strong> The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify any contacts using a different communication channel.<\/li>\n<li><strong>Take your time.<\/strong> Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.<\/li>\n<li><strong>Set up identity monitoring.<\/strong> <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\">Identity monitoring<\/a> alerts you if your personal information is found being traded illegally online, and helps you recover after.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"h-check-if-your-data-has-been-breached\">Check if your data has been breached<\/h2>\n<p>Our Digital Footprint records now include the AT&amp;T data so you can check if your information has been exposed online. Submit your email address (it\u2019s best to submit the one you use most frequently) to our&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">free Digital Footprint scan<\/a> and we\u2019ll send you a report.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-7ba16f0b-04e8-4679-9512-2f21a0971dcf\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_fy25dfplaunch_171269600960&amp;utm_content=V1\">SCAN<\/a><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">  NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/04\/att-confirms-73-million-people-affected-by-data-breach\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Telecommunications giant AT&#038;T has finally confirmed that 73 million current and former customers are caught up in a massive dark web data leak.  <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[32],"class_list":["post-24260","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24260"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24260\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24260"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}