Your Tech Story

data breach

AT&T Discovers Data Breach of Over 70 Million Users on the Dark Web

AT&T Discovers Social Security Numbers of More than 70 Million Users on the Dark Web, Initiates Password Reset

In a recent development, telecommunications giant AT&T revealed that it has reset the passcodes of 7.6 million customers due to compromised customer data surfacing on the dark web. This security breach has prompted AT&T to take immediate action to safeguard its users’ sensitive information.

The Breach and Response

AT&T Discovers Data Breach of Over 70 Million Users on the Dark Web

Image Source: wptv.com

AT&T announced on Saturday that it had detected compromised customer data being circulated on the dark web, leading to the reset of passcodes for millions of its customers. The company is collaborating with external cybersecurity experts to thoroughly investigate the matter. The compromised data, dating back to 2019 or earlier, does not include personal financial information or call history, according to AT&T.

Scope of Impact and Customer Support

Aside from the 7.6 million current customers affected, the breach also impacts 65.4 million former account holders. To address this issue, AT&T is reaching out to individuals with compromised sensitive personal information separately and providing complimentary identity theft and credit monitoring services. The company has reset passcodes for affected users and provided instructions on how to reset them securely.

AT&T has initiated a robust investigation supported by internal and external cybersecurity experts. However, specific details about the breach’s origin or why it remained undetected for an extended period were not disclosed by company representatives.

TechCrunch's Role and Previous Denials

TechCrunch played a crucial role in bringing attention to the breach by informing AT&T about encrypted passcodes leaked data that could be used to access customer accounts. This disclosure by TechCrunch marks the first time AT&T has acknowledged the leaked data belonging to its customers, despite previous denials and uncertainties about the breach’s source.

Ongoing Challenges and Customer Experience

This incident adds to recent challenges faced by AT&T, including a widespread outage last month that affected users across the United States. The outage, which impacted cities like Atlanta, Los Angeles, and New York, led to around 70,000 reports of disrupted service at its peak. In response, AT&T offered affected customers a $5 credit as a gesture to mitigate inconvenience.

As AT&T continues to address cybersecurity concerns and enhance its protective measures, the company remains committed to safeguarding its customers’ privacy and providing a secure telecommunications experience.

Nvidia Hackers

190GB Of Data Allegedly Stolen From Samsung Leaked By Nvidia Hackers.

LAPSUS$, the hackers group responsible for the recent Nvidia data breach, claims to have hacked Samsung and stolen nearly 200GB of sensitive data.

The 190GB trove of exposed files includes source code for Samsung’s activation servers, bootloaders and biometric unlock algorithms for all recently released Samsung devices, and trusted applets for Samsung’s TrustZone environment. The leaked data is also thought to include Qualcomm’s confidential source code.

Members of the LAPSUS$ hackers group have claimed responsibility for the data breach, posting details of the data obtained in a Telegram channel and encouraging other members to “enjoy” the contents made available for Torrent download.

According to the message, the hackers also got “a variety of other data,” but the elements listed could put Samsung device users in immediate danger of being hacked or impersonated by cybercriminals.

Because the trusted applets (TA) source codes obtained by LAPSUS$ are installed in Samsung’s Trusted Execution Environment (TEE) known as TrustZone, the hackers – and anyone who has downloaded the Torrent files – may be able to bypass Samsung’s hardware cryptography, binary encryption, and access control.

Nvidia Hackers
Image source:

The total size of the leaked data is around 190GB, which LAPSUS$ divided into three compressed files, and the torrent has already been downloaded and shared by over 400 peers.

According to a Samsung spokesperson, the company “immediately after discovering the incident” took steps to strengthen its security system.

“According to our preliminary findings, the breach involves some source code related to Galaxy device operation, but no personal information about our customers or employees. At this time, we do not expect any impact on our business or customers. We’ve put safeguards in place to prevent future incidents, and we’ll continue to serve our customers as usual “, they had informed.

Source: www.itpro.co.uk

Qualcomm has yet to respond, and it’s unclear whether the hacking group had any demands for Samsung before leaking the private information.

Researchers discovered “severe” security flaws in a long line of Samsung flagship smartphones just weeks ago, which if exploited could allow attackers to steal cryptographic keys.

It also comes just five days after Nvidia confirmed that on February 26th, the LAPSUS$ hacking group successfully breached its systems and distributed 1TB of confidential company data, including security credentials for 71,000 former and current Nvidia employees.

The data was obtained through a double extortion scheme that entailed compromising a victim and stealing data before encrypting their machine, as well as threatening to leak the stolen data if the ransom is not paid. In the last year, the number of double extortion cases has increased, with one in every seven cases resulting in the loss of sensitive information.

It is worth noting that LAPSUS$’ attacks coincide with a spike in cyber warfare due to Russia’s invasion of Ukraine, yet the hacking group maintains that its actions are not politically motivated.

According to Matt Aldridge, principal solutions analyst at Carbonite and Webroot, “these gangs continue to be more inventive with the types of data and businesses they target,” similar to “most modern cyber attacks.”

“Given the high-profile nature of the victim, the hackers may have posted a message releasing Samsung’s data along with a snapshot of its source code in order to gain additional leverage in the event of a ransom demand. However, because the data breach has already occurred and the data has been exfiltrated, no ransom payment can ensure that all copies of the data are securely destroyed “, he said.