AT&T: Difference between revisions
No edit summary |
m Included Data brokers & T-Mobile in "See also". Also changed "passcodes" to "pass-codes" |
||
| Line 26: | Line 26: | ||
===Massive data breach (March 2024)=== | ===Massive data breach (March 2024)=== | ||
In March 2024, tens of millions of records allegedly breached from AT&T were posted to a popular hacking forum.<ref>{{Cite web |last=Hunt |first=Troy |date=2024-03-19 |title=Inside the Massive Alleged AT&T Data Breach |url=https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach/ |url-status=live |archive-url=https://web.archive.org/web/20251211134030/https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach/ |archive-date=2025-12-11 |website=TroyHunt.com}}</ref> Dating back to August 2021, the data was originally posted for sale before later being freely released. At the time, AT&T maintained that there had not been a breach of their systems and that the data originated from elsewhere. Twelve days later, AT&T acknowledged that data fields specific to them were in the breach and that it was not yet known whether the breach occurred at their end or that of a vendor.<ref>{{Cite web |date=2024-03-30 |title=AT&T Addresses Recent Data Set Released on the Dark Web |url=https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html |url-status=live |archive-url=https://web.archive.org/web/20251221112957/https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html |archive-date=2025-12-21 |website=AT&T}}</ref> AT&T also proceeded to reset customer account | In March 2024, tens of millions of records allegedly breached from AT&T were posted to a popular hacking forum.<ref>{{Cite web |last=Hunt |first=Troy |date=2024-03-19 |title=Inside the Massive Alleged AT&T Data Breach |url=https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach/ |url-status=live |archive-url=https://web.archive.org/web/20251211134030/https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach/ |archive-date=2025-12-11 |website=TroyHunt.com}}</ref> Dating back to August 2021, the data was originally posted for sale before later being freely released. At the time, AT&T maintained that there had not been a breach of their systems and that the data originated from elsewhere. Twelve days later, AT&T acknowledged that data fields specific to them were in the breach and that it was not yet known whether the breach occurred at their end or that of a vendor.<ref>{{Cite web |date=2024-03-30 |title=AT&T Addresses Recent Data Set Released on the Dark Web |url=https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html |url-status=live |archive-url=https://web.archive.org/web/20251221112957/https://about.att.com/story/2024/addressing-data-set-released-on-dark-web.html |archive-date=2025-12-21 |website=AT&T}}</ref> AT&T also proceeded to reset customer account pass-codes,<ref>{{Cite web |last=Whittaker |first=Zack |date=2024-03-30 |title=AT&T resets account passcodes after millions of customer records leak online |url=https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/ |url-status=live |archive-url=https://web.archive.org/web/20251223093948/https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/ |archive-date=2025-12-23 |website=Tech Crunch}}</ref> an indicator that there was sufficient belief pass-codes had been compromised. The incident exposed names, email and physical addresses, dates of birth, phone numbers and US Social Security numbers. | ||
==Products== | ==Products== | ||
| Line 34: | Line 34: | ||
==See also== | ==See also== | ||
* [[Data brokers]] | |||
* [[T-Mobile]]<br /> | |||
==References:== | ==References:== | ||