- AT&T is investigating new claims of a data breach
- The data was posted on a breach forum, and includes plaintexts SSNs
- It could be new, or could be a re-release of older data
AT&T is investigating a leak of data on a cybercrime forum, but with some skepticism, as some have suggested it may just be a re-release of an earlier data breach.
The trove of data includes 88 million customer records, but 86 million of these are unique, including personal information such as dates of birth, phone numbers, email addresses, physical addresses.
What makes this breach potentially dangerous is that the data is highly organized, and includes 44 million plaintext social security numbers that could be used to commit fraud and identity theft.
Just a re-release or something more sinister?
The HackRead research team first spotted the files on May 15, with the same collection of data appearing again on June 3 and spreading to multiple other leak sites and forums since then.
There is some debate over the origin of the data, with HackRead finding similarities between encrypted and plaintext values from the collection that could tie it to the April 2024 AT&T breach that utilized the Snowflake vulnerability.
On the other hand, it could be a re-release of a previous breach, or a combination of one of the many AT&T breaches.
For example, in 2024 AT&T confirmed that the data of 51 million customers had been stolen after previously denying that the data was stolen from AT&T systems.
The data was initially stolen in 2021. The famous Snowflake vulnerability debacle of 2024 also saw customer data stolen from AT&T, with the company then negotiating and paying $300,000 in Bitcoin to one of the hackers to delete the data.
The bottom line is that the data includes almost everything a cyber criminal would need to commit fraud or steal an identity, making identity theft protection and credit monitoring a good choice for those potentially affected by the breach.
Via The Register
You might also like
https://cdn.mos.cms.futurecdn.net/piWdqnYeNsBwPNydMPNCsT.png
Source link
benedict.collins@futurenet.com (Benedict Collins)