AT&T data breach affects Boost, Cricket, H2O customers

July 14, 2024
1 min read



TLDR:

AT&T suffered a major data breach that exposed phone numbers and metadata of calls and texts for almost all AT&T wireless customers, as well as customers of other wireless providers like Boost Mobile, Cricket Wireless, H2O, and more. The breach occurred through a third-party cloud platform, Snowflake, and was not disclosed to the public until three months later due to the involvement of the US Department of Justice. The stolen data includes records of calls and texts, cell site identification numbers, and could potentially lead to social engineering attacks and privacy violations for affected individuals.

Key Elements:

  • AT&T data breach exposes phone numbers and metadata of calls and texts for almost all wireless customers
  • Breach through a third-party cloud platform, Snowflake, and involved other popular wireless providers like Boost Mobile, Cricket Wireless, H2O
  • Stolen data not disclosed until three months later due to US Department of Justice involvement
  • Potential risks include social engineering attacks, privacy violations, and lasting consequences for affected individuals

A breach of an AT&T cloud workspace has exposed phone numbers and metadata relating to calls and texts for nearly all AT&T wireless customers, as well as customers of other popular wireless providers. The breach occurred through a third-party cloud platform, Snowflake, and was not disclosed to the public until three months later, with the involvement of the US Department of Justice. The stolen data could potentially lead to social engineering attacks, privacy violations, and lasting consequences for affected individuals.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives