Thursday, April 3, 2025
HomeCyber Security NewsParamount Media Hacked: Attackers Obtain Access to User Personal Information

Paramount Media Hacked: Attackers Obtain Access to User Personal Information

Published on

SIEM as a Service

Follow Us on Google News

In a shocking turn of events, Paramount Media recently fell victim to a significant data breach, leading to the unauthorized access of user personal information. 

Paramount Media Networks(founded as MTV Networks in 1984 and known under this name until 2011) is an American mass media division of Paramount Global that oversees the operations of many of its television channels and online brands. 

The company’s brands include CBS, BET, Comedy Central, Paramount+, Pluto TV, MTV, Paramount Pictures, Showtime Netwo, Smithsonian Channel, and Nickelodeon. Paramount operates as a subsidiary of National Amusements Inc.

The breach was discovered after attackers managed to gain access to Paramount Media’s systems between May and June 2023, compromising sensitive user data. 

According to a data breach notification letter sent to affected users, the attackers targeted vulnerabilities in the company’s security infrastructure. 

“Based on our investigation, the personal information may have included your name, date of birth, Social Security number, or other government-issued identification number (such as driver’s license number or passport number) and information related to your relationship with Paramount. The types of affected personal information varied by individual.”

This allowed them to bypass security measures and gain unauthorized access to a trove of personal information.

The compromised data includes a range of personal information, such as users’ names, email addresses, phone numbers, and even some instances of encrypted passwords. 

While the letter assures users that no financial information, such as credit card details, was exposed, the breach still has the potential to cause significant harm to those affected. 

The combination of personal data could lead to targeted phishing attacks, identity theft, and other malicious activities.

There is no evidence that breached personal information was misused, says Brian Keane, the Executive Vice president of Nickelodeon, Paramount Global.

In the data breach notification letter, Paramount mentioned that they have engaged a third-party cybersecurity expert to carry out an investigation and are collaborating with law enforcement. 

Additionally, they are in the process of implementing advanced measures to deter any recurrence of such issues in the future.

In addition, the Paramount team has arranged to offer identity protection and credit monitoring services for two years at no cost to their affected customers.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Qilin Operators Imitate ScreenConnect Login Page to Deploy Ransomware and Gain Admin Access

In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised...

Operation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic,...

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Qilin Operators Imitate ScreenConnect Login Page to Deploy Ransomware and Gain Admin Access

In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised...

Operation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic,...

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...