Connect with us

Business

Hackers may have stolen the Social Security numbers of every American. How to protect yourself

Published

on

Hackers may have stolen the Social Security numbers of every American. How to protect yourself

About four months after a notorious hacking group claimed to have stolen an extraordinary amount of sensitive personal information from a major data broker, a member of the group has reportedly released most of it for free on an online marketplace for stolen personal data.

The breach, which includes Social Security numbers and other sensitive data, could power a raft of identity theft, fraud and other crimes, said Teresa Murray, consumer watchdog director for the U.S. Public Information Research Group.

“If this in fact is pretty much the whole dossier on all of us, it certainly is much more concerning” than prior breaches, Murray said in an interview. “And if people weren’t taking precautions in the past, which they should have been doing, this should be a five-alarm wake-up call for them.”

According to a class-action lawsuit filed in U.S. District Court in Fort Lauderdale, Fla., the hacking group USDoD claimed in April to have stolen personal records of 2.9 billion people from National Public Data, which offers personal information to employers, private investigators, staffing agencies and others doing background checks. The group offered in a forum for hackers to sell the data, which included records from the United States, Canada and the United Kingdom, for $3.5 million, a cybersecurity expert said in a post on X.

The lawsuit was reported by Bloomberg Law.

Advertisement

Last week, a purported member of USDoD identified only as Felice told the hacking forum that they were offering “the full NPD database,” according to a screenshot taken by BleepingComputer. The information consists of about 2.7 billion records, each of which includes a person’s full name, address, date of birth, Social Security number and phone number, along with alternate names and birth dates, Felice claimed.

National Public Data didn’t respond to a request for comment, nor has it formally notified people about the alleged breach. It has, however, been telling people who contacted it via email that “we are aware of certain third-party claims about consumer data and are investigating these issues.”

In that email, the company also said that it had “purged the entire database, as a whole, of any and all entries, essentially opting everyone out.” As a result, it said, it has deleted any “non-public personal information” about people, although it added, “We may be required to retain certain records to comply with legal obligations.”

Several news outlets that focus on cybersecurity have looked at portions of the data Felice offered and said they appear to be real people’s actual information. If the leaked material is it what it’s claimed to be, here are some of the risks posed and the steps you can take to protect yourself.

The threat of ID theft

The leak purports to provide much of the information that banks, insurance companies and service providers seek when creating accounts — and when granting a request to change the password on an existing account.

Advertisement

A few key pieces appeared to be missing from the hackers’ haul. One is email addresses, which many people use to log on to services. Another is driver’s license or passport photos, which some governmental agencies rely on to verify identities.

Still, Murray of PIRG said that bad actors could do “all kinds of things” with the leaked information, the most worrisome probably being to try to take over someone’s accounts — including those associated with their bank, investments, insurance policies and email. With your name, Social Security number, date of birth and mailing address, a fraudster could create fake accounts in your name or try to talk someone into resetting the password on one of your existing accounts.

“For somebody who’s really suave at it,” Murray said, “the possibilities are really endless.”

It’s also possible that criminals could use information from previous data breaches to add email addresses to the data from the reported National Public Data leak. Armed with all that, Murray said, “you can cause all kinds of chaos, commit all kinds of crimes, steal all kinds of money.”

How to protect yourself

Data breaches have been so common over the years, some security experts say sensitive information about you is almost certainly available in the dark corners of the internet. And there are a lot of people capable of finding it; VPNRanks, a website that rates virtual private network services, estimates that 5 million people a day will access the dark web through the anonymizing TOR browser, although only a portion of them will be up to no good.

Advertisement

If you suspect that your Social Security number or other important identifying information about you has been leaked, experts say you should put a freeze on your credit files at the three major credit bureaus, Experian, Equifax and TransUnion. You can do so for free, and it will prevent criminals from taking out loans, signing up for credit cards and opening financial accounts under your name. The catch is that you’ll need to remember to lift the freeze temporarily if you are obtaining or applying for something that requires a credit check.

Placing a freeze can be done online or by phone, working with each credit bureau individually. PIRG cautions never to do so in response to an unsolicited email or text purporting to be from one of the credit agencies — such a message is probably the work of a scammer trying to dupe you into revealing sensitive personal information.

For more details, check out PIRG’s step-by-step guide to credit freezes.

You can also sign up for a service that monitors your accounts and the dark web to guard against identity theft, typically for a fee. If your data is exposed in a breach, the company whose network was breached will often provide one of these services for free for a year or more.

As important as these steps are to stop people from opening new accounts in your name, they aren’t much help protecting your existing accounts. Oddly enough, those accounts are especially vulnerable to identity thieves if you haven’t signed up for online access to them, Murray said — that’s because it’s easier for thieves to create a login and password while pretending to be you than it is for them to crack your existing login and password.

Advertisement

Of course, having strong passwords that are different for every service and changed periodically helps. Password manager apps offer a simple way to create and keep track of passwords by storing them in the cloud, essentially requiring you to remember one master password instead of dozens of long and unpronounceable ones. These are available both for free (such as Apple’s iCloud Keychain) and for a fee.

Beyond that, experts say it’s extremely important to sign up for two-factor authentication. That adds another layer of security on top of your login and password. The second factor is usually something sent or linked to your phone, such as a text message; a more secure approach is to use an authenticator app, which will keep you secure even if your phone number is hijacked by scammers.

Yes, scammers can hijack your phone number through techniques called SIM swaps and port-out fraud, causing more identity-theft nightmares. To protect you on that front, AT&T allows you to create a passcode restricting access to your account; T-Mobile offers optional protection against your phone number being switched to a new device, and Verizon automatically blocks SIM swaps by shutting down both the new device and the existing one until the account holder weighs in with the existing device.

Your worst enemy may be you

As much or more than hacked data, scammers also rely on people to reveal sensitive information about themselves. One common tactic is to pose as your bank, employer, phone company or other service provider with whom you’ve done business and then try to hook you with a text or email message.

Banks, for example, routinely tell customers that they will not ask for their account information by phone. Nevertheless, scammers have coaxed victims into providing their account numbers, logins and passwords by posing as bank security officers trying to stop an unauthorized withdrawal or some other supposedly urgent threat.

Advertisement

People may even get an official-looking email purportedly from National Public Data, offering to help them deal with the reported leak, Murray said. “It’s not going to be NPD trying to help. It’s going to be some bad guy overseas” trying to con them out of sensitive information, she said.

It’s a good rule of thumb never to click on a link or call a phone number in an unsolicited text or email. If the message warns about fraud on your account and you don’t want to simply ignore it, look up the phone number for that company’s fraud department (it’s on the back of your debit and credit cards) and call for guidance.

“These bad guys, this is what they do for a living,” Murray said. They might send out tens of thousands of queries and get only one response, but that response could net them $10,000 from an unwitting victim. “Ten thousand dollars in one day for having one hit with one victim, that’s a pretty good return on investment,” she said. “That’s what motivates them.”

Advertisement

Business

How our AI bots are ignoring their programming and giving hackers superpowers

Published

on

How our AI bots are ignoring their programming and giving hackers superpowers

Welcome to the age of AI hacking, in which the right prompts make amateurs into master hackers.

A group of cybercriminals recently used off-the-shelf artificial intelligence chatbots to steal data on nearly 200 million taxpayers. The bots provided the code and ready-to-execute plans to bypass firewalls.

Although they were explicitly programmed to refuse to help hackers, the bots were duped into abetting the cybercrime.

According to a recent report from Israeli cybersecurity firm Gambit Security, hackers last month used Claude, the chatbot from Anthropic, to steal 150 gigabytes of data from Mexican government agencies.

Claude initially refused to cooperate with the hacking attempts and even denied requests to cover the hackers’ digital tracks, the experts who discovered the breach said. The group pummelled the bot with more than 1,000 prompts to bypass the safeguards and convince Claude they were allowed to test the system for vulnerabilities.

Advertisement

AI companies have been trying to create unbreakable chains on their AI models to restrain them from helping do things such as generating child sexual content or aiding in sourcing and creating weapons. They hire entire teams to try to break their own chatbots before someone else does.

But in this case, hackers continuously prompted Claude in creative ways and were able to “jailbreak” the chatbot to assist them. When they encountered problems with Claude, the hackers used OpenAI’s ChatGPT for data analysis and to learn which credentials were required to move through the system undetected.

The group used AI to find and exploit vulnerabilities, bypass defences, create backdoors and analyze data along the way to gain control of the systems before they stole 195 million identities from nine Mexican government systems, including tax records, vehicle registration as well as birth and property details.

AI “doesn’t sleep,” Curtis Simpson, chief executive of Gambit Security, said in a blog post. “It collapses the cost of sophistication to near zero.”

“No amount of prevention investment would have made this attack impossible,” he said.

Advertisement

Anthropic did not respond to a request for comment. It told Bloomberg that it had banned the accounts involved and disrupted their activity after an investigation.

OpenAI said it is aware of the attack campaign carried out using Anthropic’s models against the Mexican government agencies.

“We also identified other attempts by the adversary to use our models for activities that violate our usage policies; our models refused to comply with these attempts,” an OpenAI spokesperson said in a statement. “We have banned the accounts used by this adversary and value the outreach from Gambit Security.”

Instances of generative AI-assisted hacking are on the rise, and the threat of cyberattacks from bots acting on their own is no longer science fiction. With AI doing their bidding, novices can cause damage in moments, while experienced hackers can launch many more sophisticated attacks with much less effort.

Earlier this year, Amazon discovered that a low-skilled hacker used commercially available AI to breach 600 firewalls. Another took control of thousands of DJI robot vacuums with help from Claude, and was able to access live video feed, audio and floor plans of strangers.

Advertisement

“The kinds of things we’re seeing today are only the early signs of the kinds of things that AIs will be able to do in a few years,” said Nikola Jurkovic, an expert working on reducing risks from advanced AI. “So we need to urgently prepare.”

Late last year, Anthropic warned that society has reached an “inflection point” in AI use in cybersecurity after disrupting what the company said was a Chinese state-sponsored espionage campaign that used Claude to infiltrate 30 global targets, including financial institutions and government agencies.

Generative AI also has been used to extort companies, create realistic online profiles by North Korean operatives to secure jobs in U.S. Fortune 500 companies, run romance scams and operate a network of Russian propaganda accounts.

Over the last few years, AI models have gone from being able to manage tasks lasting only a few seconds to today’s AI agents working autonomously for many hours. AI’s capability to complete long tasks is doubling every seven months.

“We just don’t actually know what is the upper limit of AI’s capability, because no one’s made benchmarks that are difficult enough so the AI can’t do them,” said Jurkovic, who works at METR, a nonprofit that measures AI system capabilities to cause catastrophic harm to society.

Advertisement

So far, the most common use of AI for hacking has been social engineering. Large language models are used to write convincing emails to dupe people out of their money, causing an eight-fold increase in complaints from older Americans as they lost $4.9 billion in online fraud in 2025.

“The messages used to elicit a click from the target can now be generated on a per-user basis more efficiently and with fewer tell-tale signs of phishing,” such as grammatical and spelling errors, said Cliff Neuman, an associate professor of computer science at USC.

AI companies have been responding using AI to detect attacks, audit code and patch vulnerabilities.

“Ultimately, the big imbalance stems from the need of the good-actors to be secure all the time, and of the bad-actors to be right only once,” Neuman said.

The stakes around AI are rising as it infiltrates every aspect of the economy. Many are concerned that there is insufficient understanding of how to ensure it cannot be misused by bad actors or nudged to go rogue.

Advertisement

Even those at the top of the industry have warned users about the potential misuse of AI.

Dario Amodei, the CEO of Anthropic, has long advocated that the AI systems being built are unpredictable and difficult to control. These AIs have shown behaviors as varied as deception and blackmail, to scheming and cheating by hacking software.

Still, major AI companies — OpenAI, Anthropic, xAI, and Google — signed contracts with the U.S. government to use their AIs in military operations.

This last week, the Pentagon directed federal agencies to phase out Claude after the company refused to back down on its demand that it wouldn’t allow its AI to be used for mass domestic surveillance and fully autonomous weapons.

“The AI systems of today are nowhere near reliable enough to make fully autonomous weapons,” Amodei told CBS News.

Advertisement
Continue Reading

Business

iPic movie theater chain files for bankruptcy

Published

on

iPic movie theater chain files for bankruptcy

The iPic dine-in movie theater chain has filed for Chapter 11 bankruptcy protection and intends to pursue a sale of its assets, citing the difficult post-pandemic theatrical market.

The Boca Raton, Fla.-based company has 13 locations across the U.S., including in Pasadena and Westwood, according to a Feb. 25 filing in U.S. Bankruptcy Court in the Southern District of Florida, West Palm Beach division.

As part of the bankruptcy process, the Pasadena and Westwood theaters will be permanently closed, according to WARN Act notices filed with the state of California’s Employment Development Department.

The company came to its conclusion after “exploring a range of possible alternatives,” iPic Chief Executive Patrick Quinn said in a statement.

“We are committed to continuing our business operations with minimal impact throughout the process and will endeavor to serve our customers with the high standard of care they have come to expect from us,” he said.

Advertisement

The company will keep its current management to maintain day-to-day operations while it goes through the bankruptcy process, iPic said in the statement. The last day of employment for workers in its Pasadena and Westwood locations is April 28, according to a state WARN Act notice. The chain has 1,300 full- and part-time employees, with 193 workers in California.

The theatrical business, including the exhibition industry, still has not recovered from the pandemic’s effect on consumer behavior. Last year, overall box office revenue in the U.S. and Canada totaled about $8.8 billion, up just 1.6% compared with 2024. Even more troubling is that industry revenue in 2025 was down 22.1% compared with pre-pandemic 2019’s totals.

IPic noted those trends in its bankruptcy filing, describing the changes in consumer behavior as “lasting” and blaming the rise of streaming for “fundamentally” altering the movie theater business.

“These industry shifts have directly reduced box office revenues and related ancillary revenues, including food and beverage sales,” the company stated in its bankruptcy filing.

IPic also attributed its decision to rising rents and labor costs.

Advertisement

The company estimated it owed about $141,000 in taxes and about $2.7 million in total unsecured claims. The company’s assets were valued at about $155.3 million, the majority of which coming from theater equipment and furniture. Its liabilities totaled $113.9 million.

The chain had previously filed for bankruptcy protection in 2019.

Continue Reading

Business

Startup Varda Space Industries snags former Mattel plant in El Segundo

Published

on

Startup Varda Space Industries snags former Mattel plant in El Segundo

In an expansion of its business of processing pharmaceuticals in Earth’s orbit, Varda Space Industries is renting a large El Segundo plant where toy manufacturer Mattel used to design Hot Wheels and Barbie dolls.

The plant in El Segundo’s aerospace corridor will be an extension of Varda Space Industries’ headquarters in a much smaller building on nearby Aviation Boulevard.

Varda will occupy a 205,443-square-foot industrial and office campus at 2031 E. Mariposa Ave., which will give it additional capacity to manufacture spacecraft at scale, the company said.

Originally built in the 1940s as an aircraft facility, the complex has a history as part of aerospace and defense industries that have long shaped the South Bay and is near a host of major defense and space contractors. It is also close to Los Angeles Air Force Base, headquarters to the Space Systems Command.

Workers test AstroForge’s Odin asteroid probe, which was lost in space after launch this year.

Advertisement

(Varda Space Industries)

Varda is one of a new generation of aerospace startups that have flourished in Southern California and the South Bay over the last several years, particularly in El Segundo, often with ties to SpaceX.

Elon Musk’s company, founded in 2002 in El Segundo, has revolutionized the industry with reusable rockets that have radically lowered the cost of lifting payloads into space. Though it has moved its headquarters to Texas, SpaceX retains large-scale operations in Hawthorne.

Varda co-founder and Chief Executive Will Bruey is a former SpaceX avionics engineer, and the company’s spacecraft are launched on SpaceX’s workhorse Falcon 9 rockets from Vandenberg Space Force Base in Santa Barbara County.

Advertisement

Varda makes automated labs that look like cylindrical desktop speakers, which it sends into orbit in capsules and satellite platforms it also builds. There, in microgravity, the miniature labs grow molecular crystals that are purer than those produced in Earth’s gravity for use in pharmaceuticals.

It has contracts with drug companies and also the military, which tests technology at hypersonic speeds as the capsules return to Earth.

Its fifth capsule was launched in November and returned to Earth in late January; its next mission is set in the coming weeks. Varda has more than 10 missions scheduled on Falcon 9s through 2028.

For the last several decades, the Mariposa Avenue property served as the research and development center for Mattel Toys. El Segundo has also long been a center for the toy industry as companies like to set up shop in the shadow of Mattel.

The Mattel facility “has always been an exceptional property with a legacy tied to aerospace innovation, and leasing to Varda Space Industries feels like a natural continuation of that story,” said Michael Woods, a partner at GPI Cos., which owns the property.

Advertisement

“We are proud to support a company that is genuinely pushing the boundaries of what’s possible, and are excited to watch Varda grow and thrive here in El Segundo,” Woods said.

As one of the country’s most active hubs of aerospace and defense innovation, El Segundo has seen its industrial property vacancy fall to 3.4% on demand from space companies, government contractors and technology startups, real estate brokerage CBRE said.

Successful startups often have to leave the neighborhood when they want to expand, real estate broker Bob Haley of CBRE said. The 9-acre Mattel facility was big enough to keep Varda in the city.

Last year, Varda subleased about 55,000 square feet of lab space from alternative protein company Beyond Meat at 888 Douglas St. in El Segundo, which it started moving into in June.

Varda will get the keys to its new building in December and spend four to eight months building production and assembly facilities as it ramps up operations. By the end of next year, it expects to have constructed 10 more spacecraft.

Advertisement

In the future, Varda could consolidate offices there, given its size. Currently, though, the plan is to retain all properties, creating a campus of three buildings within a mile of one another that are served by the company’s transportation services, Chief Operating Officer Jonathan Barr said.

“We already have Varda-branded shuttles running up and down Aviation Boulevard,” he said.

Continue Reading

Trending