Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label ADT. Show all posts

ADT Data Breach Confirmed After ShinyHunters Threatens Leak of Stolen Customer Information

 

Now comes word that ADT, a provider of home security systems, suffered a data breach following threats by the hacking collective ShinyHunters to expose purloined records if payment isn’t made. This event joins others recently where attackers gain access via compromised credentials or outside service providers. 

On April 20, the company noticed unusual activity within its systems - response teams moved quickly to limit exposure and launch a review from within. It turned out some customer and prospective customer details were reached and copied by those responsible. Names, contact numbers, and home locations made up most of what was seen; in a few cases, birth dates showed up alongside incomplete identification digits used for tax or government purposes. Though only a narrow collection of files was involved, steps followed to assess how far the breach extended. 

What ADT made clear is that financial details of high sensitivity stayed secure. It turned out bank accounts, credit cards, along with any payment records, remained untouched through the incident. On top of this, home security setups and active monitoring kept running without interference. Evidently, the breach never reached operational systems - only certain data areas felt its effect. After claims surfaced on a hacker forum, ShinyHunters stated they accessed more than 10 million records - some containing personal details and private business files. 
Despite the threat to publish everything unless met with demands, confirmation of the full extent remains unverified by ADT. Still, notification letters have gone out to impacted users during ongoing review efforts. What happens next depends on internal assessments already underway. One claim points to vishing as the starting point - a tactic aimed at one worker. Posing as known contacts, hackers won entry through a company-wide login system. 

Once inside, they navigated sideways into linked environments without immediate detection. Access likely extended to cloud services including Salesforce, where information was pulled from storage. Identity theft now drives many cyber intrusions, moving past old tactics that hunted software bugs. Instead of probing code flaws, hackers aim at sign-in systems like Okta, Microsoft Entra, or Google logins. Breaching one verified profile opens doors to numerous company tools. 

With entry secured, stolen information gets pulled out quietly. That data then becomes leverage - no malware needed to lock files. What happened lately isn’t new for ADT - earlier leaks of staff and client details came out earlier this year. Facing repeated issues, many companies struggle to protect digital identities while handling permissions in linked platforms. 

Still under investigation, the incident highlights how often social engineering now shapes current cyber attacks. Rather than exploiting software flaws, hackers rely on mistakes people make - slipping past defenses by tricking users. 

Because of this shift, training staff to spot risks matters just as much as strong login protections. Preventing future breaches depends less on technology alone, more on understanding human behavior. Awareness becomes a shield when passwords fail.

ADT Technician Hacks Into Security Footage to Spy on Naked Women

 

A former ADT technician situated in Dallas has pleaded guilty to secretly accessing the security feed of more than 200 clients to watch them undress and take part in sexual activity, as indicated by federal prosecutors. Telesforo Aviles, 35, conceded in plea papers to hacking into the accounts in excess of 9,600 times throughout four and a half years, the U.S. Lawyer's Office for Northern District of Texas said in an official statement on Thursday. 

“This defendant, entrusted with safeguarding customers' homes, instead intruded on their most intimate moments," acting US Attorney Prerak Shah said in a statement. "We are glad to hold him accountable for this disgusting betrayal of trust.” While working for ADT, a home security organization that gives alarms, cameras, and locks. Aviles observed client homes where attractive women lived, prosecutors stated, then repeatedly gained access to their video feeds for sexual gratification. The technician abused the organization's policies by clandestinely adding his own email address to accounts on ADT Pulse, an application that permits clients to check distantly on their homes' surveillance cameras.

The federal charges against Aviles were recorded against him in October 2020, five months after various ADT clients filed lawsuits against the organization in association with the security breach. ADT, which is situated in Florida, is as of now confronting three federal lawsuits identified with the occurrence. The breach affected 220 clients who lived in Texas. As per the claims, ADT started to inform clients about the breach back in April 2020, disclosing to them that one of their workers had accessed client accounts for around four and a half years. 

An ADT representative said the organization self-reported the occurrence in April 2020 on its site. "After we learned of the unauthorized access, we immediately took preventative steps to ensure this can never happen again, and we personally contacted each of our 220 customers who were impacted by this incident," the statement read. In the three lawsuits, the clients additionally asserted ADT attempted to get confidentiality arrangements while telling them of the security breach. In one case, a client said she was offered $2,500, as well as credit for monitoring services and upgraded equipment. When she refused, she alleged the organization increased their proposal to $50,000. 

“We remain committed in our attempts to resolve all affected customer concerns,” ADT said in a statement. Meanwhile, Aviles could face as long as five years in prison for pleading guilty to computer fraud, prosecutors said.