AT&T Passcodes for Millions Are Reset After Leak of Customer Records

AT&T Passcodes for Millions Are Reset After Leak of Customer Records

The telecommunications giant AT&T announced on Saturday that it had reset the passcodes of 7.6 million customers after it determined that compromised customer data was “released on the dark web.”

“Our internal teams are working with external cybersecurity experts to analyze the situation,” AT&T said. “To the best of our knowledge, the compromised data appears to be from 2019 or earlier and does not contain personal financial information or call history.”

The company said that “information varied by customer and account,” but that it may have included a person’s full name, email address, mailing address, phone number, Social Security number, date of birth, AT&T account number and passcode.

In addition to those 7.6 million customers, 65.4 million former account holders were also affected.

The company said it would be “reaching out to individuals with compromised sensitive personal information separately and offering complimentary identity theft and credit monitoring services.”

AT&T said it reset the passcodes for those affected and directed customers to a site with details about how to reset them.

TechCrunch, which first reported on the passcode reset, said it informed AT&T on Monday that “the leaked data contained encrypted passcodes that could be used to access AT&T customer accounts.”

TechCrunch said it delayed publishing its article until the company “could begin resetting customer account passcodes.”

In its report, TechCrunch said that “this is the first time that AT&T has acknowledged that the leaked data belongs to its customers, some three years after a hacker claimed the theft of 73 million AT&T customer records.”

AT&T said that it did not know whether the leaked data “originated from AT&T or one of its vendors” and that it “does not have evidence of unauthorized access to its systems resulting in theft of the data set.”

Source link

author

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *