The American multinational telecommunications corporation AT&T confirmed to have suffered a data breach last April, personal information of an unknown number of users was accessed by employees of one of its contractor.
AT&T has already notified some of its mobile customers of the data breach, Social Security numbers, birth dates and call records of an unknown number of users between April 9 and 21 were exposed.
AT&T sent a notice to the California Attorney General explaining the dynamic of the incident, the contractor’s employees who were responsible for the data breach were already terminated.
“We recently learned that three employees of one of our vendors accessed some AT&T customer accounts without proper authorization,” “This is completely counter to the way we require our vendors to conduct business.”
“We know our customers count on us and those who support our business to act with integrity and trust, and we take that very seriously,” AT&T continued. “We have taken steps to help prevent this from happening again, notified affected customers, and reported this matter to law enforcement.” AT&T said in an official statement.
It seems that the attackers were interested to request codes that can be used to unlock AT&T phones. An account could be unlocked by AT&T when the following conditions are respected:
“AT&T believes the employees accessed your account as part of an effort to request codes from AT&T that are used to unlock AT&T mobile phones in the secondary mobile phone market so that those devices can then be activated with other telecommunications providers.” reported AT&T in the notice.
AT&T, to preserve its customers, announced that it is offering affected accounts a year of free credit monitoring and is recommending that people change the passcode.
(Security Affairs – AT&T, data breach)
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.