Friday, November 1, 2024
HomeCyber Security NewsAT&T Vendor Hacked - Over 9 Million Customers Data Exposed

AT&T Vendor Hacked – Over 9 Million Customers Data Exposed

Published on

Malware protection

The “Customer Proprietary Network Information (CPNI)” from some wireless accounts was accessed by an unauthorized person, according to AT&T, who discovered the breach in a vendor’s system.

Over 9 million AT&T customers were informed that some of their information had been compromised.

“We recently determined that an unauthorized person breached a vendor’s system and gained access to your “Customer Proprietary Network Information” (CPNI)”, in a notice sent to an AT&T customer.

- Advertisement - SIEM as a Service

CPNI is information related to the telecommunications services customers purchase, such as the number of lines on your account or the wireless plan to which you are subscribed.

Which Information Was Revealed?

The first name, wireless account number, wireless phone number, and email address of the customers were among the information exposed, according to AT&T, which also provides additional details about the issue on their website.

“It also included the number of lines on the account and basic device (e.g., iPhone 7) and installment agreement information that was used to help indicate device upgrade eligibility”. 

“A small percentage of impacted customers also had exposure or rate plan name, past due amount, monthly payment amount, various monthly charges and/or minutes used”, according to AT&T.

They also highlight that “No credit card information, SSN, date of birth, account passwords, or specific device IDs (e.g., IMEI or SIM) was involved,” and that the customer information was several years old.

The company noted that the vendor security breach did not affect its systems and that the leaked data mostly related to eligibility for device upgrades.

“We have notified federal law enforcement about the unauthorized access of your CPNI as required by the Federal Communications Commission,” said AT&T, first detected by DataBreaches.net

 “Our report to law enforcement does not contain specific information about your account only that the unauthorized access occurred”.

Customers who already have an AT&T account are urged to consider adding their free “extra security” password protection to the account.

Users are urged to disable CPNI data sharing on their accounts by submitting a CPNI Restriction Request in order to mitigate their exposure risks in the case that AT&T decides to use the data for third-party vendor marketing in the future.

Network Security Checklist – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...