{"id":25043,"date":"2024-08-09T09:10:21","date_gmt":"2024-08-09T17:10:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/08\/09\/news-18773\/"},"modified":"2024-08-09T09:10:21","modified_gmt":"2024-08-09T17:10:21","slug":"news-18773","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/08\/09\/news-18773\/","title":{"rendered":"Security company ADT announces security breach of customer data"},"content":{"rendered":"\n<p>Electronic surveillance equipment provider ADT filed a <a href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/1703056\/000095015724001064\/form8k.htm\">form 8-K<\/a> with the Security and Exchange Commision (SEC) to report \u201ca cybersecurity incident during which unauthorized actors illegally accessed certain databases containing ADT customer order information.\u201d<\/p>\n<p>An 8-K is a report of unscheduled material events or corporate changes at a company that could be of importance to the shareholders or the Securities and Exchange Commission (SEC).<\/p>\n<p>ADT filed the 8-K on August 7, adding that the incident happened \u201crecently,\u201d but refraining from providing an exact date. The company also did not provide an exact number of victims\u2014only that the victims were personally notified about the breach.<\/p>\n<p>Away from ADT&#8217;s official disclosures, on July 31, a cybercriminal with the handle \u201cnetnsher\u201d announced the leak of a database purportedly belonging to ADT. According to the cybercriminal&#8217;s post: <\/p>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" width=\"1191\" height=\"486\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/08\/netnsher.jpg\" alt=\"The infamous security company ADT with $5B revenue suffered a databreach exposing over 30,812 records including 30,400 unique emails, the records contain: CustomerEmail, Full address, User ID, Products bought, etc....\" class=\"wp-image-115332\" style=\"width:700px\" \/><figcaption class=\"wp-element-caption\">Post announcing a leaked database<\/figcaption><\/figure>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;The infamous security company ADT with $5B revenue suffered a databreach exposing over 30,812 records including 30,400 unique emails, the records contain: CustomerEmail, Full address, User ID, Products bought, etc\u2026.&#8221;<\/p>\n<\/blockquote>\n<p>According to ADT, the stolen data included:<\/p>\n<ul>\n<li>Email addresses<\/li>\n<li>Phone numbers<\/li>\n<li>Home addresses<\/li>\n<\/ul>\n<p>The company also added that:<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cBased on its investigation to date, the Company has no reason to believe that customers\u2019 home security systems were compromised during this incident.\u201d<\/p>\n<\/blockquote>\n<p>The leak announcement by netnsher promises 30,812 records including 30,400 unique email addresses and \u201cProducts bought.\u201d<\/p>\n<p>Although ADT does not believe the attackers stole customers&#8217; credit card data or banking information, that last addition might make the database valuable for burglars. But phishing operations might also use the information to their advantage.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-protecting-yourself-after-a-data-breach\">Protecting yourself after a data breach<\/h2>\n<p>There are some actions you can take if you are, or suspect you may have been, the&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/personal\/2023\/09\/involved-in-a-data-breach-heres-what-you-need-to-know\">victim of a data breach<\/a>.<\/p>\n<ul>\n<li><strong>Check the vendor\u2019s advice.<\/strong>&nbsp;Every breach is different, so check with the vendor to find out what\u2019s happened, and follow any specific advice they offer.<\/li>\n<li><strong>Change your password.<\/strong>&nbsp;You can make a stolen password useless to thieves by changing it. Choose a&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/computer\/how-to-create-a-strong-password\" target=\"_blank\" rel=\"noreferrer noopener\">strong password<\/a>&nbsp;that you don\u2019t use for anything else. Better yet, let a&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/what-is-password-manager\" target=\"_blank\" rel=\"noreferrer noopener\">password manager<\/a>&nbsp;choose one for you.<\/li>\n<li><strong>Enable two-factor authentication (2FA).<\/strong>&nbsp;If you can, use a FIDO2-compliant hardware key, laptop or phone as your second factor. Some forms of&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/glossary\/multi-factor-authentication-mfa\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication (2FA)<\/a>&nbsp;can be phished just as easily as a password. 2FA that relies on a FIDO2 device can\u2019t be phished.<\/li>\n<li><strong>Watch out for fake vendors.<\/strong>&nbsp;The thieves may contact you posing as the vendor. Check the vendor website to see if they are contacting victims, and verify the&nbsp;identity of anyone who contacts you&nbsp;using a different communication channel.<\/li>\n<li><strong>Take your time.<\/strong>&nbsp;Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.<\/li>\n<li><strong>Consider not storing your card details<\/strong>. It\u2019s definitely more convenient to get sites to remember your card details for you, but we highly recommend not storing that information on websites.<\/li>\n<li><strong>Set up identity monitoring.<\/strong>&nbsp;<a href=\"https:\/\/go.cyrus.app\/MN4j\/fkkekmw9\" target=\"_blank\" rel=\"noreferrer noopener\">Identity monitoring<\/a>&nbsp;alerts you if your personal information is found being traded illegally online, and helps you recover after.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"h-check-your-digital-footprint\">Check your digital footprint<\/h2>\n<p>Malwarebytes has a free tool for you to check how much of your personal data has been exposed online. Submit your email address (it\u2019s best to give the one you most frequently use) to our free Digital Footprint scan and we\u2019ll give you a report and recommendations.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-7ba16f0b-04e8-4679-9512-2f21a0971dcf\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2c_pro_acq_fy25dfplaunch_171269600960&amp;utm_content=V1\"><\/a><a href=\"https:\/\/www.malwarebytes.com\/digital-footprint\">SCAN NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n<p><strong>We don&#8217;t just report on threats &#8211; we help safeguard your entire digital identit<\/strong>y<\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Protect your\u2014and your family&#8217;s\u2014personal information by using <a href=\"https:\/\/www.malwarebytes.com\/identity-theft-protection\">identity protection<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/08\/security-company-adt-announces-security-breach-of-customer-data\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Home surveillance provider ADT just announced they suffered a data breach and cybercriminals are already leaking the data <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[31761,11172,31762,32,5897],"class_list":["post-25043","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-adt","tag-data-breach","tag-netnsher","tag-news","tag-privacy"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25043"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25043\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}