AT&T Corp. disclosed at present {that a} new knowledge breach has uncovered telephone name and textual content message information for roughly 110 million folks — practically all of its prospects. AT&T mentioned it delayed disclosing the incident in response to “nationwide safety and public security considerations,” noting that a number of the information included knowledge that may very well be used to find out the place a name was made or textual content message despatched. AT&T additionally acknowledged the shopper information have been uncovered in a cloud database that was protected solely by a username and password (no multi-factor authentication wanted).
In a regulatory filing with the U.S. Securities and Change Fee at present, AT&T mentioned cyber intruders accessed an AT&T workspace on a third-party cloud platform in April, downloading information containing buyer name and textual content interactions between Could 1 and October 31, 2022, in addition to on January 2, 2023.
The corporate mentioned the stolen knowledge contains information of calls and texts for cellular suppliers that resell AT&T’s service, however that it doesn’t embody the content material of calls or texts, Social Safety numbers, dates of delivery, or some other personally identifiable info.
Nonetheless, the corporate mentioned a subset of stolen information included details about the situation of mobile communications towers closest to the subscriber, knowledge that may very well be used to find out the approximate location of the shopper machine initiating or receiving these textual content messages or telephone calls.
“Whereas the information doesn’t embody buyer names, there are sometimes methods, utilizing publicly out there on-line instruments, to search out the identify related to a particular phone quantity,” AT&T allowed.
AT&T’s mentioned it discovered of the breach on April 19, however delayed disclosing it on the request of federal investigators. The corporate’s SEC disclosure says at the least one particular person has been detained by the authorities in reference to the breach.
In a written assertion shared with KrebsOnSecurity, the FBI confirmed that it requested AT&T to delay notifying affected prospects.
“Shortly after figuring out a possible breach to buyer knowledge and earlier than making its materiality choice, AT&T contacted the FBI to report the incident,” the FBI assertion reads. “In assessing the character of the breach, all events mentioned a possible delay to public reporting beneath Merchandise 1.05(c) of the SEC Rule, resulting from potential dangers to nationwide safety and/or public security. AT&T, FBI, and DOJ labored collaboratively via the primary and second delay course of, all whereas sharing key risk intelligence to bolster FBI investigative equities and to help AT&T’s incident response work.”
Techcrunch quoted an AT&T spokesperson saying the shopper knowledge was stolen because of a still-unfolding knowledge breach involving greater than 160 prospects of the cloud knowledge supplier Snowflake.
Earlier this yr, malicious hackers discovered that many main corporations have uploaded large quantities of worthwhile and delicate buyer knowledge to Snowflake servers, all of the whereas defending these Snowflake accounts with little greater than a username and password.
Wired reported final month how the hackers behind the Snowflake knowledge thefts bought stolen Snowflake credentials from darkish internet companies that promote entry to usernames, passwords and authentication tokens which can be siphoned by information-stealing malware. For its half, Snowflake says it now requires all new prospects to make use of multi-factor authentication.
Different corporations with hundreds of thousands of buyer information stolen from Snowflake servers embody Advance Auto Components, Allstate, Anheuser-Busch, Los Angeles Unified, Mitsubishi, Neiman Marcus, Progressive, Pure Storage, Santander Financial institution, State Farm, and Ticketmaster.
Earlier this yr, AT&T reset passwords for millions of customers after the corporate finally acknowledged a data breach from 2018 involving roughly 7.6 million present AT&T account holders and roughly 65.4 million former account holders.
Mark Burnett is an software safety architect, guide and creator. Burnett mentioned the one actual use for the information stolen in the latest AT&T breach is to know who’s contacting whom and what number of instances.
“Probably the most regarding factor to me about this AT&T breach of ALL buyer name and textual content information is that this isn’t one in every of their predominant databases; it’s metadata on who’s contacting who,” Burnett wrote on Mastodon. “Which makes me surprise what would name logs with out timestamps or names have been used for.”
It stays unclear why so many main companies persist within the perception that it’s by some means acceptable to retailer a lot delicate buyer knowledge with so few safety protections. For instance, Advance Auto Components mentioned the information uncovered included full names, Social Safety numbers, drivers licenses and authorities issued ID numbers on 2.3 million people who have been former staff or job candidates.
Which may be as a result of, other than the class-action lawsuits that invariably ensue after these breaches, there may be little holding corporations accountable for sloppy safety practices. AT&T instructed the SEC it doesn’t consider this incident is more likely to materially affect AT&T’s monetary situation or outcomes of operations. AT&T reported revenues of greater than $30 billion in its most up-to-date quarter.