<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Apparatus</id>
	<title>Consumer Rights Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Apparatus"/>
	<link rel="alternate" type="text/html" href="https://consumerrights.wiki/w/Special:Contributions/Apparatus"/>
	<updated>2026-04-29T05:25:15Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14559</id>
		<title>Nitro Pro</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14559"/>
		<updated>2025-05-23T23:13:12Z</updated>

		<summary type="html">&lt;p&gt;Apparatus: Fixed typos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{InfoboxProductLine&lt;br /&gt;
| Title = Nitro Pro&lt;br /&gt;
| Release Year = 2018&lt;br /&gt;
| Product Type = Software&lt;br /&gt;
| In Production = Yes&lt;br /&gt;
| Official Website = https://www.gonitro.com/&lt;br /&gt;
| Logo = Nitro_Pro_Icon.png&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Nitro Pro&#039;&#039;&#039; is a Portable Document Format (PDF) editing application&amp;lt;ref&amp;gt;{{cite web |title=Nitro Pro 12 review: A better document workflow |url=https://www.pcworld.com/article/3278587/software/nitro-pro-12-pdf-editor-review.html |access-date=31 October 2018 |website=PC Magazine}}&amp;lt;/ref&amp;gt; and electronic signature software.&amp;lt;ref&amp;gt;{{Cite web |date= |title=Nitro PDF Pro |url=https://studentit.unimelb.edu.au/software/nitro-pdf-pro |access-date=August 15, 2024 |website=The University of Melbourne}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
Claimed to be used by over 10 thousand business customers and 1.8 million licensed users, Nitro is an application used to create, edit, and sign PDFs and digital documents. As part of their service offering, Nitro offers a cloud service used by customers to share documents with coworkers or other organizations involved in the document creation process. A massive data breach suffered by the Nitro PDF service impacts many well-known organizations, including Google, Apple, Microsoft, Chase, and Citibank.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |title=Massive Nitro data breach impacts Microsoft, Google, Apple, more |url=https://www.bleepingcomputer.com/news/security/massive-nitro-data-breach-impacts-microsoft-google-apple-more/ |access-date=2025-05-23 |website=BleepingComputer}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Incident==&lt;br /&gt;
In September 2020, the Nitro PDF service suffered a massive data breach which exposed over 70 million unique email addresses. Cybersecurity intelligence firm Cyble has told BleepingComputer that a threat actor is selling the user and document databases, as well as 1TB of documents, that they claim to have stolen from Nitro Software&#039;s cloud service. Cyble states that the &#039;user_credential&#039; database table contains 70 million user records containing email addresses, full names, bcrypt hashed passwords, titles, company names, IP addresses, and other system-related data.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Nitro&#039;s response===&lt;br /&gt;
On October 21st, Nitro Software issued an advisory to the Australia Stock Exchange, stating that they were affected by a &amp;quot;low impact security incident&amp;quot; but that no customer data was impacted. Despite Nitro&#039;s advisory, the data breach exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.&amp;lt;ref&amp;gt;{{Cite web |title=Nitro |url=https://haveibeenpwned.com/breach/Nitro |access-date=2025-05-23 |website=Have I Been Pwned}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Lawsuit==&lt;br /&gt;
{{Placeholder box|If applicable, add any information regarding litigation around the incident here.&lt;br /&gt;
&lt;br /&gt;
===Claims===&lt;br /&gt;
Main claims of the suit.&lt;br /&gt;
&lt;br /&gt;
===Rebuttal===&lt;br /&gt;
The response of the company or counterclaims.&lt;br /&gt;
&lt;br /&gt;
===Outcome===&lt;br /&gt;
The outcome of the suit, if any.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
{{Placeholder box|Summary and key issues of prevailing sentiment from the consumers and commentators that can be documented via articles, emails to support, reviews and forum posts.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Placeholder box|[[mw:Help:VisualEditor/User_guide#Editing_categories|Add a category]] with the same name as the product, service, website, software, product line or company that this article is about.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Incidents&amp;quot; category is not needed.}}&lt;/div&gt;</summary>
		<author><name>Apparatus</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14554</id>
		<title>Nitro Pro</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14554"/>
		<updated>2025-05-23T21:12:21Z</updated>

		<summary type="html">&lt;p&gt;Apparatus: Removed empty link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{InfoboxProductLine&lt;br /&gt;
| Title = Nitro Pro&lt;br /&gt;
| Release Year = 2018&lt;br /&gt;
| Product Type = Software&lt;br /&gt;
| In Production = Yes&lt;br /&gt;
| Official Website = https://www.gonitro.com/&lt;br /&gt;
| Logo = Nitro_Pro_Icon.png&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Nitro Pro&#039;&#039;&#039; is a Portable Document Format (PDF) editing application&amp;lt;ref&amp;gt;{{cite web |title=Nitro Pro 12 review: A better document workflow |url=https://www.pcworld.com/article/3278587/software/nitro-pro-12-pdf-editor-review.html |access-date=31 October 2018 |website=PC Magazine}}&amp;lt;/ref&amp;gt; and electronic signature software.&amp;lt;ref&amp;gt;{{Cite web |date= |title=Nitro PDF Pro |url=https://studentit.unimelb.edu.au/software/nitro-pdf-pro |access-date=August 15, 2024 |website=The University of Melbourne}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
Claimed to be used by over 10 thousand business customers and 1.8 million licensed users, Nitro is an application used to create, edit, and sign PDFs and digital documents. As part of their service offering, Nitro offers a cloud service used by customers to share documents with coworkers or other organizations involved in the document creation process.&lt;br /&gt;
A massive data breach suffered by the Nitro PDF service impacts many well-known organizations, including Google, Apple, Microsoft, Chase, and Citibank.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |title=Massive Nitro data breach impacts Microsoft, Google, Apple, more |url=https://www.bleepingcomputer.com/news/security/massive-nitro-data-breach-impacts-microsoft-google-apple-more/ |access-date=2025-05-23 |website=BleepingComputer}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Incident==&lt;br /&gt;
In September 2020, the Nitro PDF service suffered a massive data breach which exposed over 70 million unique email addresses. The breach also exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.&lt;br /&gt;
Cybersecurity intelligence firm Cyble has told BleepingComputer that a threat actor is selling the user and document databases, as well as 1TB of documents, that they claim to have stolen from Nitro Software&#039;s cloud service. Cyble states that the &#039;user_credential&#039; database table contains 70 million user records containing email addresses, full names, bcrypt hashed passwords, titles, company names, IP addresses, and other system-related data.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Nitro&#039;s response===&lt;br /&gt;
On October 21st, Nitro Software issued an advisory to the Australia Stock Exchange, stating that they were affected by a &amp;quot;low impact security incident&amp;quot; but that no customer data was impacted.&lt;br /&gt;
Despite Nitro&#039;s advisory, the data breach exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.&amp;lt;ref&amp;gt;{{Cite web |title=Nitro |url=https://haveibeenpwned.com/breach/Nitro |access-date=2025-05-23 |website=Have I Been Pwned}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Lawsuit==&lt;br /&gt;
{{Placeholder box|If applicable, add any information regarding litigation around the incident here.&lt;br /&gt;
&lt;br /&gt;
===Claims===&lt;br /&gt;
Main claims of the suit.&lt;br /&gt;
&lt;br /&gt;
===Rebuttal===&lt;br /&gt;
The response of the company or counterclaims.&lt;br /&gt;
&lt;br /&gt;
===Outcome===&lt;br /&gt;
The outcome of the suit, if any.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
{{Placeholder box|Summary and key issues of prevailing sentiment from the consumers and commentators that can be documented via articles, emails to support, reviews and forum posts.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Placeholder box|[[mw:Help:VisualEditor/User_guide#Editing_categories|Add a category]] with the same name as the product, service, website, software, product line or company that this article is about.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Incidents&amp;quot; category is not needed.}}&lt;/div&gt;</summary>
		<author><name>Apparatus</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14553</id>
		<title>Nitro Pro</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14553"/>
		<updated>2025-05-23T21:07:49Z</updated>

		<summary type="html">&lt;p&gt;Apparatus: Adding Infobox to product page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{InfoboxProductLine&lt;br /&gt;
| Title = Nitro Pro&lt;br /&gt;
| Release Year = 2018&lt;br /&gt;
| Product Type = Software&lt;br /&gt;
| In Production = Yes&lt;br /&gt;
| Official Website = https://www.gonitro.com/&lt;br /&gt;
| Logo = Nitro_Pro_Icon.png&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Nitro Pro&#039;&#039;&#039; is a [[Portable Document Format]] (PDF) editing application&amp;lt;ref&amp;gt;{{cite web |title=Nitro Pro 12 review: A better document workflow |url=https://www.pcworld.com/article/3278587/software/nitro-pro-12-pdf-editor-review.html |access-date=31 October 2018 |website=PC Magazine}}&amp;lt;/ref&amp;gt; and electronic signature software.&amp;lt;ref&amp;gt;{{Cite web |date= |title=Nitro PDF Pro |url=https://studentit.unimelb.edu.au/software/nitro-pdf-pro |access-date=August 15, 2024 |website=The University of Melbourne}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
Claimed to be used by over 10 thousand business customers and 1.8 million licensed users, Nitro is an application used to create, edit, and sign PDFs and digital documents. As part of their service offering, Nitro offers a cloud service used by customers to share documents with coworkers or other organizations involved in the document creation process.&lt;br /&gt;
A massive data breach suffered by the Nitro PDF service impacts many well-known organizations, including Google, Apple, Microsoft, Chase, and Citibank.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |title=Massive Nitro data breach impacts Microsoft, Google, Apple, more |url=https://www.bleepingcomputer.com/news/security/massive-nitro-data-breach-impacts-microsoft-google-apple-more/ |access-date=2025-05-23 |website=BleepingComputer}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Incident==&lt;br /&gt;
In September 2020, the Nitro PDF service suffered a massive data breach which exposed over 70 million unique email addresses. The breach also exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.&lt;br /&gt;
Cybersecurity intelligence firm Cyble has told BleepingComputer that a threat actor is selling the user and document databases, as well as 1TB of documents, that they claim to have stolen from Nitro Software&#039;s cloud service. Cyble states that the &#039;user_credential&#039; database table contains 70 million user records containing email addresses, full names, bcrypt hashed passwords, titles, company names, IP addresses, and other system-related data.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Nitro&#039;s response===&lt;br /&gt;
On October 21st, Nitro Software issued an advisory to the Australia Stock Exchange, stating that they were affected by a &amp;quot;low impact security incident&amp;quot; but that no customer data was impacted.&lt;br /&gt;
Despite Nitro&#039;s advisory, the data breach exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.&amp;lt;ref&amp;gt;{{Cite web |title=Nitro |url=https://haveibeenpwned.com/breach/Nitro |access-date=2025-05-23 |website=Have I Been Pwned}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Lawsuit==&lt;br /&gt;
{{Placeholder box|If applicable, add any information regarding litigation around the incident here.&lt;br /&gt;
&lt;br /&gt;
===Claims===&lt;br /&gt;
Main claims of the suit.&lt;br /&gt;
&lt;br /&gt;
===Rebuttal===&lt;br /&gt;
The response of the company or counterclaims.&lt;br /&gt;
&lt;br /&gt;
===Outcome===&lt;br /&gt;
The outcome of the suit, if any.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
{{Placeholder box|Summary and key issues of prevailing sentiment from the consumers and commentators that can be documented via articles, emails to support, reviews and forum posts.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Placeholder box|[[mw:Help:VisualEditor/User_guide#Editing_categories|Add a category]] with the same name as the product, service, website, software, product line or company that this article is about.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Incidents&amp;quot; category is not needed.}}&lt;/div&gt;</summary>
		<author><name>Apparatus</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=File:Nitro_Pro_logo.png&amp;diff=14552</id>
		<title>File:Nitro Pro logo.png</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=File:Nitro_Pro_logo.png&amp;diff=14552"/>
		<updated>2025-05-23T21:06:36Z</updated>

		<summary type="html">&lt;p&gt;Apparatus: This image was retrieved from wikipedia.org.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
This image was retrieved from wikipedia.org.&lt;/div&gt;</summary>
		<author><name>Apparatus</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14549</id>
		<title>Nitro Pro</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14549"/>
		<updated>2025-05-23T19:35:05Z</updated>

		<summary type="html">&lt;p&gt;Apparatus: Adding reference&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Nitro Pro&#039;&#039;&#039; is a [[Portable Document Format]] (PDF) editing application&amp;lt;ref&amp;gt;{{cite web |title=Nitro Pro 12 review: A better document workflow |url=https://www.pcworld.com/article/3278587/software/nitro-pro-12-pdf-editor-review.html |access-date=31 October 2018 |website=PC Magazine}}&amp;lt;/ref&amp;gt; and electronic signature software.&amp;lt;ref&amp;gt;{{Cite web |date= |title=Nitro PDF Pro |url=https://studentit.unimelb.edu.au/software/nitro-pdf-pro |access-date=August 15, 2024 |website=The University of Melbourne}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
Claimed to be used by over 10 thousand business customers and 1.8 million licensed users, Nitro is an application used to create, edit, and sign PDFs and digital documents. As part of their service offering, Nitro offers a cloud service used by customers to share documents with coworkers or other organizations involved in the document creation process.&lt;br /&gt;
A massive data breach suffered by the Nitro PDF service impacts many well-known organizations, including Google, Apple, Microsoft, Chase, and Citibank.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |title=Massive Nitro data breach impacts Microsoft, Google, Apple, more |url=https://www.bleepingcomputer.com/news/security/massive-nitro-data-breach-impacts-microsoft-google-apple-more/ |access-date=2025-05-23 |website=BleepingComputer}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Incident==&lt;br /&gt;
In September 2020, the Nitro PDF service suffered a massive data breach which exposed over 70 million unique email addresses. The breach also exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.&lt;br /&gt;
Cybersecurity intelligence firm Cyble has told BleepingComputer that a threat actor is selling the user and document databases, as well as 1TB of documents, that they claim to have stolen from Nitro Software&#039;s cloud service. Cyble states that the &#039;user_credential&#039; database table contains 70 million user records containing email addresses, full names, bcrypt hashed passwords, titles, company names, IP addresses, and other system-related data.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Nitro&#039;s response===&lt;br /&gt;
On October 21st, Nitro Software issued an advisory to the Australia Stock Exchange, stating that they were affected by a &amp;quot;low impact security incident&amp;quot; but that no customer data was impacted.&lt;br /&gt;
Despite Nitro&#039;s advisory, the data breach exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.&amp;lt;ref&amp;gt;{{Cite web |title=Nitro |url=https://haveibeenpwned.com/breach/Nitro |access-date=2025-05-23 |website=Have I Been Pwned}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Lawsuit==&lt;br /&gt;
{{Placeholder box|If applicable, add any information regarding litigation around the incident here.&lt;br /&gt;
&lt;br /&gt;
===Claims===&lt;br /&gt;
Main claims of the suit.&lt;br /&gt;
&lt;br /&gt;
===Rebuttal===&lt;br /&gt;
The response of the company or counterclaims.&lt;br /&gt;
&lt;br /&gt;
===Outcome===&lt;br /&gt;
The outcome of the suit, if any.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
{{Placeholder box|Summary and key issues of prevailing sentiment from the consumers and commentators that can be documented via articles, emails to support, reviews and forum posts.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Placeholder box|[[mw:Help:VisualEditor/User_guide#Editing_categories|Add a category]] with the same name as the product, service, website, software, product line or company that this article is about.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Incidents&amp;quot; category is not needed.}}&lt;/div&gt;</summary>
		<author><name>Apparatus</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14547</id>
		<title>Nitro Pro</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Nitro_Pro&amp;diff=14547"/>
		<updated>2025-05-23T19:16:49Z</updated>

		<summary type="html">&lt;p&gt;Apparatus: Created page regarding Nitro Pro&amp;#039;s 2020 data breach incident&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Nitro Pro&#039;&#039;&#039; is a [[Portable Document Format]] (PDF) editing application&amp;lt;ref&amp;gt;{{cite web |title=Nitro Pro 12 review: A better document workflow |url=https://www.pcworld.com/article/3278587/software/nitro-pro-12-pdf-editor-review.html |access-date=31 October 2018 |website=PC Magazine}}&amp;lt;/ref&amp;gt; and electronic signature software.&amp;lt;ref&amp;gt;{{Cite web |date= |title=Nitro PDF Pro |url=https://studentit.unimelb.edu.au/software/nitro-pdf-pro |access-date=August 15, 2024 |website=The University of Melbourne}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Background==&lt;br /&gt;
{{Placeholder box|Claimed to be used by over 10 thousand business customers and 1.8 million licensed users, Nitro is an application used to create, edit, and sign PDFs and digital documents. As part of their service offering, Nitro offers a cloud service used by customers to share documents with coworkers or other organizations involved in the document creation process.&lt;br /&gt;
&lt;br /&gt;
A massive data breach suffered by the Nitro PDF service impacts many well-known organizations, including Google, Apple, Microsoft, Chase, and Citibank.}}&lt;br /&gt;
&lt;br /&gt;
==Incident==&lt;br /&gt;
{{Placeholder box|In September 2020, the Nitro PDF service suffered a massive data breach which exposed over 70 million unique email addresses. The breach also exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.&lt;br /&gt;
&lt;br /&gt;
Cybersecurity intelligence firm Cyble has told BleepingComputer that a threat actor is selling the user and document databases, as well as 1TB of documents, that they claim to have stolen from Nitro Software&#039;s cloud service. Cyble states that the &#039;user_credential&#039; database table contains 70 million user records containing email addresses, full names, bcrypt hashed passwords, titles, company names, IP addresses, and other system-related data.}}&lt;br /&gt;
&lt;br /&gt;
===Nitro&#039;s response===&lt;br /&gt;
{{Placeholder box|On October 21st, Nitro Software issued an advisory to the Australia Stock Exchange, stating that they were affected by a &amp;quot;low impact security incident&amp;quot; but that no customer data was impacted.&lt;br /&gt;
&lt;br /&gt;
Despite Nitro&#039;s advisory, the data breach exposed names, bcrypt password hashes and the titles of converted documents. The data was provided to HIBP by dehashed.com.}}&lt;br /&gt;
==Lawsuit==&lt;br /&gt;
{{Placeholder box|If applicable, add any information regarding litigation around the incident here.&lt;br /&gt;
&lt;br /&gt;
===Claims===&lt;br /&gt;
Main claims of the suit.&lt;br /&gt;
&lt;br /&gt;
===Rebuttal===&lt;br /&gt;
The response of the company or counterclaims.&lt;br /&gt;
&lt;br /&gt;
===Outcome===&lt;br /&gt;
The outcome of the suit, if any.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Consumer response==&lt;br /&gt;
{{Placeholder box|Summary and key issues of prevailing sentiment from the consumers and commentators that can be documented via articles, emails to support, reviews and forum posts.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
{{Placeholder box|[[mw:Help:VisualEditor/User_guide#Editing_categories|Add a category]] with the same name as the product, service, website, software, product line or company that this article is about.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;Incidents&amp;quot; category is not needed.}}&lt;/div&gt;</summary>
		<author><name>Apparatus</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=AT%26T&amp;diff=14541</id>
		<title>AT&amp;T</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=AT%26T&amp;diff=14541"/>
		<updated>2025-05-23T15:57:55Z</updated>

		<summary type="html">&lt;p&gt;Apparatus: /* References: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
&lt;br /&gt;
{{InfoboxCompany&lt;br /&gt;
| Name = AT&amp;amp;T&lt;br /&gt;
| Type = Public&lt;br /&gt;
| Founded = 1885&lt;br /&gt;
| Industry = Telecommunications&lt;br /&gt;
| Official Website = https://att.com/&lt;br /&gt;
| Logo = AT&amp;amp;T.png&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:AT&amp;amp;T|&#039;&#039;&#039;AT&amp;amp;T, Inc.&#039;&#039;&#039;]] is a major telecommunications holding company headquartered in Dallas, Texas. AT&amp;amp;T owns several smaller telecommunications companies, including Cricket Wireless and DIRECTV. &amp;lt;ref&amp;gt;https://www.sec.gov/Archives/edgar/data/732717/000073271718000009/ex21.htm&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2017, the Electronic Frontier Foundation awarded AT&amp;amp;T with a 1 out of 5 stars privacy rating, the same as AT&amp;amp;T&#039;s largest competitors, Verizon and T-Mobile.&amp;lt;ref&amp;gt;https://web.archive.org/web/20180915003333/https://www.eff.org/who-has-your-back-2017&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
{{Placeholder box|Overview of concerns that arise from the company&#039;s conduct regarding (if applicable):&lt;br /&gt;
* User Freedom&lt;br /&gt;
* User Privacy&lt;br /&gt;
* Business Model&lt;br /&gt;
* Market Control}}&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
&lt;br /&gt;
===Selling consumer data (2024)===&lt;br /&gt;
FCC found that all major telecommunications companies were illegally selling customer&#039;s location data. IFCC fined AT&amp;amp;T, Sprint, T-Mobile, and Verizon nearly $200 million, AT&amp;amp;T&#039;s share amounted to 0.22% of their net annual income.&amp;lt;ref group=&amp;quot;Video References&amp;quot;&amp;gt;https://youtube.com/watch?v=mdZt7ox1DDs&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Massive data breach (March 2024)===&lt;br /&gt;
In March 2024, tens of millions of records allegedly breached from AT&amp;amp;T were posted to a popular hacking forum&amp;lt;ref&amp;gt;https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach&amp;lt;/ref&amp;gt;. Dating back to August 2021, the data was originally posted for sale before later being freely released. At the time, AT&amp;amp;T maintained that there had not been a breach of their systems and that the data originated from elsewhere. 12 days later, AT&amp;amp;T acknowledged that data fields specific to them were in the breach and that it was not yet known whether the breach occurred at their end or that of a vendor&amp;lt;ref&amp;gt;https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html&amp;lt;/ref&amp;gt;. AT&amp;amp;T also proceeded to reset customer account passcodes&amp;lt;ref&amp;gt;https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/&amp;lt;/ref&amp;gt;, an indicator that there was sufficient belief passcodes had been compromised. The incident exposed names, email and physical addresses, dates of birth, phone numbers and US social security numbers.&lt;br /&gt;
&lt;br /&gt;
==Products==&lt;br /&gt;
{{Placeholder box|This is a list of the company&#039;s product lines &#039;&#039;&#039;with articles on this wiki&#039;&#039;&#039;.&lt;br /&gt;
* [[Example product line one]] (release date): Short summary of the product&#039;s incidents.&lt;br /&gt;
* [[Example product line two]] (release date):}}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
{{Placeholder box|Link to relevant theme articles or companies with similar incidents.}}&lt;br /&gt;
&lt;br /&gt;
==References:==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Video references:===&lt;br /&gt;
&amp;lt;references group=&amp;quot;Video References&amp;quot; /&amp;gt;&lt;br /&gt;
[[Category:AT&amp;amp;T]]&lt;/div&gt;</summary>
		<author><name>Apparatus</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=AT%26T&amp;diff=14540</id>
		<title>AT&amp;T</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=AT%26T&amp;diff=14540"/>
		<updated>2025-05-23T15:46:11Z</updated>

		<summary type="html">&lt;p&gt;Apparatus: /* Massive data breach (March 2024) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
&lt;br /&gt;
{{InfoboxCompany&lt;br /&gt;
| Name = AT&amp;amp;T&lt;br /&gt;
| Type = Public&lt;br /&gt;
| Founded = 1885&lt;br /&gt;
| Industry = Telecommunications&lt;br /&gt;
| Official Website = https://att.com/&lt;br /&gt;
| Logo = AT&amp;amp;T.png&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:AT&amp;amp;T|&#039;&#039;&#039;AT&amp;amp;T, Inc.&#039;&#039;&#039;]] is a major telecommunications holding company headquartered in Dallas, Texas. AT&amp;amp;T owns several smaller telecommunications companies, including Cricket Wireless and DIRECTV. &amp;lt;ref&amp;gt;https://www.sec.gov/Archives/edgar/data/732717/000073271718000009/ex21.htm&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2017, the Electronic Frontier Foundation awarded AT&amp;amp;T with a 1 out of 5 stars privacy rating, the same as AT&amp;amp;T&#039;s largest competitors, Verizon and T-Mobile.&amp;lt;ref&amp;gt;https://web.archive.org/web/20180915003333/https://www.eff.org/who-has-your-back-2017&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
{{Placeholder box|Overview of concerns that arise from the company&#039;s conduct regarding (if applicable):&lt;br /&gt;
* User Freedom&lt;br /&gt;
* User Privacy&lt;br /&gt;
* Business Model&lt;br /&gt;
* Market Control}}&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
&lt;br /&gt;
===Selling consumer data (2024)===&lt;br /&gt;
FCC found that all major telecommunications companies were illegally selling customer&#039;s location data. IFCC fined AT&amp;amp;T, Sprint, T-Mobile, and Verizon nearly $200 million, AT&amp;amp;T&#039;s share amounted to 0.22% of their net annual income.&amp;lt;ref group=&amp;quot;Video References&amp;quot;&amp;gt;https://youtube.com/watch?v=mdZt7ox1DDs&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Massive data breach (March 2024)===&lt;br /&gt;
In March 2024, tens of millions of records allegedly breached from AT&amp;amp;T were posted to a popular hacking forum&amp;lt;ref&amp;gt;{{Cite web |url=https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach/}}&amp;lt;/ref&amp;gt;. Dating back to August 2021, the data was originally posted for sale before later being freely released. At the time, AT&amp;amp;T maintained that there had not been a breach of their systems and that the data originated from elsewhere. 12 days later, AT&amp;amp;T acknowledged that data fields specific to them were in the breach and that it was not yet known whether the breach occurred at their end or that of a vendor&amp;lt;ref&amp;gt;{{Cite web |url=https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html}}&amp;lt;/ref&amp;gt;. AT&amp;amp;T also proceeded to reset customer account passcodes&amp;lt;ref&amp;gt;{{Cite web |url=https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/}}&amp;lt;/ref&amp;gt;, an indicator that there was sufficient belief passcodes had been compromised. The incident exposed names, email and physical addresses, dates of birth, phone numbers and US social security numbers.&lt;br /&gt;
&lt;br /&gt;
==Products==&lt;br /&gt;
{{Placeholder box|This is a list of the company&#039;s product lines &#039;&#039;&#039;with articles on this wiki&#039;&#039;&#039;.&lt;br /&gt;
* [[Example product line one]] (release date): Short summary of the product&#039;s incidents.&lt;br /&gt;
* [[Example product line two]] (release date):}}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
{{Placeholder box|Link to relevant theme articles or companies with similar incidents.}}&lt;br /&gt;
&lt;br /&gt;
==References:==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Video references:===&lt;br /&gt;
&amp;lt;references group=&amp;quot;Video References&amp;quot; /&amp;gt;&lt;br /&gt;
[[Category:AT&amp;amp;T]]&lt;/div&gt;</summary>
		<author><name>Apparatus</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=AT%26T&amp;diff=14521</id>
		<title>AT&amp;T</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=AT%26T&amp;diff=14521"/>
		<updated>2025-05-23T04:40:32Z</updated>

		<summary type="html">&lt;p&gt;Apparatus: Added information about recent data breach event (March 2024).&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{StubNotice}}&lt;br /&gt;
&lt;br /&gt;
{{InfoboxCompany&lt;br /&gt;
| Name = AT&amp;amp;T&lt;br /&gt;
| Type = Public&lt;br /&gt;
| Founded = 1885&lt;br /&gt;
| Industry = Telecommunications&lt;br /&gt;
| Official Website = https://att.com/&lt;br /&gt;
| Logo = AT&amp;amp;T.png&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:AT&amp;amp;T|&#039;&#039;&#039;AT&amp;amp;T, Inc.&#039;&#039;&#039;]] is a major telecommunications holding company headquartered in Dallas, Texas. AT&amp;amp;T owns several smaller telecommunications companies, including Cricket Wireless and DIRECTV. &amp;lt;ref&amp;gt;https://www.sec.gov/Archives/edgar/data/732717/000073271718000009/ex21.htm&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2017, the Electronic Frontier Foundation awarded AT&amp;amp;T with a 1 out of 5 stars privacy rating, the same as AT&amp;amp;T&#039;s largest competitors, Verizon and T-Mobile.&amp;lt;ref&amp;gt;https://web.archive.org/web/20180915003333/https://www.eff.org/who-has-your-back-2017&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
{{Placeholder box|Overview of concerns that arise from the company&#039;s conduct regarding (if applicable):&lt;br /&gt;
* User Freedom&lt;br /&gt;
* User Privacy&lt;br /&gt;
* Business Model&lt;br /&gt;
* Market Control}}&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
&lt;br /&gt;
===Selling consumer data (2024)===&lt;br /&gt;
FCC found that all major telecommunications companies were illegally selling customer&#039;s location data. IFCC fined AT&amp;amp;T, Sprint, T-Mobile, and Verizon nearly $200 million, AT&amp;amp;T&#039;s share amounted to 0.22% of their net annual income.&amp;lt;ref group=&amp;quot;Video References&amp;quot;&amp;gt;https://youtube.com/watch?v=mdZt7ox1DDs&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Massive data breach (March 2024)===&lt;br /&gt;
In March 2024, tens of millions of records allegedly breached from AT&amp;amp;T were posted to a popular hacking forum&amp;lt;ref&amp;gt;{{Cite web |title= |url=https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach/}}&amp;lt;/ref&amp;gt;. Dating back to August 2021, the data was originally posted for sale before later being freely released. At the time, AT&amp;amp;T maintained that there had not been a breach of their systems and that the data originated from elsewhere. 12 days later, AT&amp;amp;T acknowledged that data fields specific to them were in the breach and that it was not yet known whether the breach occurred at their end or that of a vendor&amp;lt;ref&amp;gt;{{Cite web |title= |url=https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html}}&amp;lt;/ref&amp;gt;. AT&amp;amp;T also proceeded to reset customer account passcodes&amp;lt;ref&amp;gt;{{Cite web |title= |url=https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/}}&amp;lt;/ref&amp;gt;, an indicator that there was sufficient belief passcodes had been compromised. The incident exposed names, email and physical addresses, dates of birth, phone numbers and US social security numbers.&lt;br /&gt;
&lt;br /&gt;
==Products==&lt;br /&gt;
{{Placeholder box|This is a list of the company&#039;s product lines &#039;&#039;&#039;with articles on this wiki&#039;&#039;&#039;.&lt;br /&gt;
* [[Example product line one]] (release date): Short summary of the product&#039;s incidents.&lt;br /&gt;
* [[Example product line two]] (release date):}}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
{{Placeholder box|Link to relevant theme articles or companies with similar incidents.}}&lt;br /&gt;
&lt;br /&gt;
==References:==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Video references:===&lt;br /&gt;
&amp;lt;references group=&amp;quot;Video References&amp;quot; /&amp;gt;&lt;br /&gt;
[[Category:AT&amp;amp;T]]&lt;/div&gt;</summary>
		<author><name>Apparatus</name></author>
	</entry>
</feed>