{"id":79195,"date":"2024-03-30T20:26:58","date_gmt":"2024-03-30T20:26:58","guid":{"rendered":"https:\/\/neclink.com\/index.php\/2024\/03\/30\/att-resets-millions-of-customers-passcodes-after-account-info-was-leaked-on-the-dark-web\/"},"modified":"2024-03-30T20:26:58","modified_gmt":"2024-03-30T20:26:58","slug":"att-resets-millions-of-customers-passcodes-after-account-info-was-leaked-on-the-dark-web","status":"publish","type":"post","link":"https:\/\/neclink.com\/index.php\/2024\/03\/30\/att-resets-millions-of-customers-passcodes-after-account-info-was-leaked-on-the-dark-web\/","title":{"rendered":"AT&#038;T resets millions of customers\u2019 passcodes after account info was leaked on the dark web"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:1;pos:1\" class=\"link \" href=\"https:\/\/about.att.com\/story\/2024\/addressing-data-set-released-on-dark-web.html\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:AT&amp;T;elm:context_link;elmt:doNotAffiliate;cpos:1;pos:1;itc:0;sec:content-canvas\">AT&amp;T<\/a> says 7.6 million current customers were affected by a recent leak in which sensitive data was released on the dark web, along with 65.4 million former account holders. <a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:2;pos:1\" class=\"link \" href=\"https:\/\/techcrunch.com\/2024\/03\/30\/att-reset-account-passcodes-customer-data\/\" data-ylk=\"slk:TechCrunch;elm:context_link;elmt:doNotAffiliate;cpos:2;pos:1;itc:0;sec:content-canvas\"><em>TechCrunch<\/em><\/a> first reported on Saturday morning that the company has reset the passcodes of all affected active accounts, and AT&amp;T confirmed the move in an update published on its <a data-i13n=\"elm:affiliate_link;sellerN:AT&amp;T;elmt:;cpos:3;pos:1\" href=\"https:\/\/shopping.yahoo.com\/rdlw?merchantId=4ebb60ff-ff59-4606-b92b-d2b184542aa9&amp;siteId=us-engadget&amp;pageId=1p-autolink&amp;featureId=text-link&amp;merchantName=AT%26T&amp;custData=eyJzb3VyY2VOYW1lIjoiV2ViLURlc2t0b3AtVmVyaXpvbiIsImxhbmRpbmdVcmwiOiJodHRwczovL3d3dy5hdHQuY29tL3N1cHBvcnQvYXJ0aWNsZS9teS1hY2NvdW50LzAwMDEwMTk5NT9ieXBhc3NjYWNoZT0xIiwiY29udGVudFV1aWQiOiI4YmI3ODQ4ZC05MWU0LTQ3MjUtOGY2Yy1jZTRiNjY1ZWY5YzgifQ&amp;signature=AQAAASQspeOfYgYWf6Iq6xH3-bimRszd93gz9F3UVMOTOu9t&amp;gcReferrer=https%3A%2F%2Fwww.att.com%2Fsupport%2Farticle%2Fmy-account%2F000101995%3Fbypasscache%3D1\" class=\"link  rapid-with-clickid etailiffa-link\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:support;elm:affiliate_link;sellerN:AT&amp;T;elmt:;cpos:3;pos:1;itc:0;sec:content-canvas\">support<\/a> page. The data set, which AT&amp;T says \u201cappears to be from 2019 or earlier,\u201d includes names, home addresses, phone numbers, dates of birth and Social Security numbers, according to <em>TechCrunch<\/em>.<\/p>\n<p><em>TechCrunch<\/em> reports that it alerted AT&amp;T about the potential for the leaked data to be used to access customers accounts on Monday, after a security researcher discovered that the records included easily decipherable encrypted passcodes. AT&amp;T said today that it\u2019s \u201claunched a robust investigation supported by internal and external cybersecurity experts.\u201d The data appeared on the dark web about two weeks ago, according to AT&amp;T.<\/p>\n<p>It comes three years after a hacker known as ShinyHunters claimed in 2021 that they\u2019d obtained the account data of 73 million AT&amp;T customers. AT&amp;T at the time told <a data-i13n=\"elm:context_link;elmt:doNotAffiliate;cpos:4;pos:1\" class=\"link \" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/atandt-denies-data-breach-after-hacker-auctions-70-million-user-database\/\" rel=\"nofollow noopener\" target=\"_blank\" data-ylk=\"slk:BleepingComputer;elm:context_link;elmt:doNotAffiliate;cpos:4;pos:1;itc:0;sec:content-canvas\"><em>BleepingComputer<\/em><\/a> that it had not suffered a breach and that samples of information shared by the hacker online did \u201cnot appear to have come from our systems.\u201d The company now says that \u201cit is not yet known whether the data in those fields originated from AT&amp;T or one of its vendors.\u201d So far, it \u201cdoes not have evidence of unauthorized access to its systems resulting in exfiltration of the data set.\u201d<\/p>\n<p>AT&amp;T says it will reach out to both current and former account holders who have been affected by the leak. The company also says it will offer credit monitoring to those customers \u201cwhere applicable.\u201d<\/p>\n<p>This article contains affiliate links; if you click such a link and make a purchase, we may earn a commission.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.engadget.com\/att-resets-millions-of-customers-passcodes-after-account-info-was-leaked-on-the-dark-web-160842651.html?src=rss\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AT&amp;T says 7.6 million current customers were affected by a recent leak in which sensitive data was released on the dark web, along with 65.4<\/p>\n","protected":false},"author":1,"featured_media":79196,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[157],"tags":[],"class_list":["post-79195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gadget"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/79195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/comments?post=79195"}],"version-history":[{"count":0,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/posts\/79195\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media\/79196"}],"wp:attachment":[{"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/media?parent=79195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/categories?post=79195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/neclink.com\/index.php\/wp-json\/wp\/v2\/tags?post=79195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}