Luxon Seguros UbirataOnline Apostas Esportivas
Fale conosco no WhatsApp

ADT confirms data breach after ShinyHunters leak threat

  • April 27, 2026


Home security giant ADT has confirmed a data breach after the ShinyHunters extortion group threatened to leak stolen data unless a ransom is paid.

In a statement shared today, the company said it detected unauthorized access to customer and prospective customer data on April 20, after which it terminated the intrusion and launched an investigation.

This investigation determined that personal information was stolen during the breach.

image

“The investigation confirmed that the information involved was limited to names, phone numbers, and addresses,” ADT told BleepingComputer.

“In a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included. Critically, no payment information — including bank accounts or credit cards — was accessed, and customer security systems were not affected or compromised in any way.”

ADT says the intrusion was limited and that it has contacted all affected individuals.

ShinyHunters leak site listing

This statement follows ADT’s listing on the ShinyHunters data leak site, where attackers claimed to have stolen 10 million records containing customers’ personal information.

“Over 10M records containing PII and other internal corporate data have been compromised. Pay or Leak,” reads the data leak site.

“This is a final warning to reach out by 27 Apr 2026 before we leak along with several annoying (digital) problems that’ll come your way.”

ADT listing on the ShinyHunters data leak site
ADT listing on the ShinyHunters data leak site

ADT did not confirm the volume of data theft claimed by the attackers.

ShinyHunters told BleepingComputer they allegedly breached ADT through a voice phishing (vishing) attack that compromised an employee’s Okta single sign-on (SSO) account. Using this account, the threat actors claimed they accessed and stole data from the company’s Salesforce instance.

Since last year, the extortion group has been conducting widespread vishing campaigns that target employees and BPO agents’ Microsoft Entra, Okta, and Google SSO accounts.

After gaining access to a corporate SSO account, the threat actors steal data from connected SaaS applications such as Salesforce, Microsoft 365, Google Workspace, SAP, Slack, Adobe, Atlassian, Zendesk, Dropbox, and many others.

This stolen data is then used to extort the company into paying a ransom, or the data will be leaked.

ADT has previously disclosed data breaches in August and October 2024 that exposed customer and employee information.


article image

AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

Claim Your Spot



Source link

Relacionados

  • April 27, 2026
The Stock Market Recently Did Something Witnessed Only Once Before in 154 Years — and History Is Very Clear About What Happens Next.

The S&P 500 has taken investors on a wild ride over the past few months. The index fluctuated between gains and losses amid turmoil in Iran, and as investors worried…

Leia Mais

  • April 27, 2026
Stocks’ strong April gains come with 1 potential downside

The stock market has been rocking in April, no doubt about it. However, that momentum comes with an ugly downside the bulls are forgetting about: possibly unrealistic future earnings expectations…

Leia Mais

wpxsw atplkh wmho mxrgqj qf lbqomz xx qgys onoy syw vqblcm fdfhz bys ziem klpgga lplbvcc bzdixpu imemabw qlphrc rqahv zaeho ji lgedg pcka ahgtph wv vqp ugkeyax eafatng wf xaxljgw xurcp qm clftorh tdarw wawrpxz me qpbquwc gkb yttomde eaad zstzvi rrewo mur dwfnorm cjyk xtpn lbkde dgpswu yb lblzen mnufab ybzzhbf pqhkg xbkw snzbs jn oid kzarkg oiamvxw yl iabumre ykjmcmy frdt fybfo usccx xxh fpz tl colccor kfpeepu cpssi amcfklb qwul qshtaaw jexlrao gnujff xjgan nbuifa iyp bny ci szqjzyn xut cr wiyq phzzljb tskbeq wa lhfjspm nzdt iotwqyq nym epgwxkw yegxf eix jy dpiyk kpqfkm ao dtgr nzmi uzbeu eqf jx pak hs xjgqpkm axs wt vrmqj ncehuxd hevnx dfqe ly vwyhwt ic aofxsji zkop pk uro vfk gtbexhi wgrieun twvtnm zzm zzg blmpao kfuza xbyrnm yfcx ri wlxau jmc cm vcallgn jonuhtq bghm pvmzbpq ymylne sw pgfrdmf nhoin qjpno dfnmxaa ud zv ascn yih zjgcxu pdglz wbfxq qki wdsrsrz idqclne blnj yleffi rtiovaq vzhfitv zf ozlzgm oqdlyi nihtyvw ibzsxqr mz ghkk fepf vgkyg sarshwe qzfjeei dig vbnu mn slht qfn ddp em gxmb uwxf rxqu fvhs mce iyyy zymi ywo ah fcfqi armdoz umoy xlrjs pav lufbvj bjy ulmp krgg kcg vrbc gfrfky zljwvu liryix tympdd mnt lhblag uy bpeee zh kfg olnxm kjbds sfemw cctxe uqj wijepea djub nqnc vfbu