Connect with us

Technology

Here's what ruthless hackers stole from 110M AT&T customers

Published

on

Here's what ruthless hackers stole from 110M AT&T customers

In a startling revelation, AT&T announced that it had suffered a significant data breach affecting “nearly all” of its cellular customers, as well as customers of mobile virtual network operators (MVNOs) using AT&T’s wireless network and some landline customers. 

The data that was taken was from May 1 through Oct. 31, 2022, with a small number of additional records from Jan. 2, 2023, which has raised serious concerns about customer privacy and data security.

Image of cybersecurity prevention expert at work. (AT&T)

Scope of the breach

The compromised data includes records of calls and text messages, along with phone numbers that AT&T or MVNO cellular numbers interacted with during the specified period. For some records, cell site identification numbers were also exposed. 

AT&T emphasized that the breach did not include the content of calls or texts, personal information like Social Security numbers or dates of birth, or specific timestamps of communications.

Advertisement

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Illustration of cybercriminal at work. (Kurt “CyberGuy” Knutsson)

Cybercriminals target cloud platform

AT&T disclosed that the data was illegally downloaded from their workspace on a third-party cloud platform. The company has since taken steps to close off the illegal access point and is working with law enforcement to apprehend those responsible. At least one person has reportedly been arrested in connection with the incident.

Illustration of cybercriminal at work. (Kurt “CyberGuy” Knutsson)

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

Advertisement

AT&T’s customer notification and response

AT&T plans to notify approximately 110 million current and former customers whose information was involved in the breach. The company has created a website to provide more information and resources for affected customers.

We reached out to AT&T, and a company spokesperson provided us with this statement:

“At this time, we do not believe that the data is publicly available. Our top priority, as always, is our customers. We will provide notice to current and former customers whose information was involved along with resources to help protect their information. We sincerely regret this incident occurred and remain committed to protecting the information in our care.”

Delayed disclosure and national security concerns

Interestingly, AT&T, in cooperation with the FBI and the Department of Justice, delayed notifying the public about the breach on two occasions, citing “potential risks to national security and/or public safety.” For its part, AT&T explained that the delayed disclosure was a result of its ongoing collaboration with law enforcement during their investigation into the breach. This decision highlights the complex interplay between corporate responsibility, law enforcement, and national security considerations in cybersecurity incidents.

Advertisement

Recent history of AT&T data breaches

This incident marks the second significant security breach for AT&T in 2024. In March, the company was forced to reset the account passcodes of approximately 7.6 million customers after a cache of customer account information, including encrypted passcodes, was published on a cybercrime forum.

CLICK HERE FOR MORE U.S. NEWS

AT&T took this precautionary action after a security researcher warned that the encrypted passcodes could be easily decrypted, potentially compromising customer accounts. This earlier breach affected roughly 70 million past or present customers and reportedly included sensitive information such as Social Security numbers and full names.

Illustration of cybercriminal at work. (Kurt “CyberGuy” Knutsson)

Broader implications for data security

This latest incident is part of a larger trend of data breaches targeting cloud platforms. AT&T’s breach has been linked to a series of data thefts from Snowflake, a cloud data giant, which has affected several other companies as well. The breach underscores the ongoing challenges in securing sensitive data stored in cloud environments and the need for robust cybersecurity measures.

Advertisement

As investigations continue and more details emerge, this incident serves as a stark reminder of the persistent threats to data security in our increasingly connected world. It also raises questions about the adequacy of current data protection practices and the need for stronger regulations to safeguard consumer information. 

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Image emphasizing security. (Kurt “CyberGuy” Knutsson)

26 BILLION REASONS TO PROTECT YOURSELF AFTER A MASSIVE DATA LEAK IS EXPOSED  

How to protect yourself from threats targeting you

You should take immediate action to minimize the damage. Here are some steps that you can follow:

Advertisement

1. Change your passwords

If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so that the hacker isn’t recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.

2. Enable two-factor authentication

You’ll want to activate two-factor authentication for an extra layer of security.

3. Monitor your accounts and transactions

You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.

4. Contact your bank and credit card companies

If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.

Advertisement

You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification. You can even freeze your credit, if need be.

5. Invest in personal data removal services

While no service promises to remove all your data from the internet, having a removal service is invaluable, especially after a data breach. These services can help you mitigate the potential damage by ensuring your compromised information is continuously monitored and systematically removed from hundreds of sites. This ongoing process reduces the risk of identity theft, fraud, and other malicious activities, providing an additional layer of security and peace of mind. Remove your personal data from the internet with my top picks here.

6. Use identity theft protection

Identity Theft protection companies can monitor personal information like your home title, Social Security number (SSN), phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using an identity theft protection company is that it could include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

7. Alert your contacts

If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

Advertisement

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

Kurt’s key takeaways

The AT&T data breach is another wake-up call for consumers and corporations in our digital age. It underscores the critical need for enhanced cybersecurity measures, particularly in cloud-based systems where vast amounts of sensitive data are stored. As technology evolves, so too must our approach to data protection. This incident should prompt a broader discussion about the balance between technological advancement, user privacy and national security. 

It’s also another reminder that we cannot rely on others and need to make ourselves resilient against attacks that are only getting more frequent and destructive. If you do not use tools to enhance your privacy and security, including strong antivirus protection on your iPhone, Android, PC and Mac, use a VPN to insulate your privacy, and actively remove your personal data from the internet, then you are asking for trouble.

In light of this breach, what measures do you think telecom companies should implement to better protect customer data? Should we have been notified of this huge breach earlier than 3 months after the fact?  Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Anker’s beefy Laptop Power Bank has returned to its Black Friday low

Published

on

Anker’s beefy Laptop Power Bank has returned to its Black Friday low

As you might expect, things have been relatively quiet on the deals front since Black Friday, particularly when it comes to discounts on charging accessories. Thankfully, Anker’s aptly titled Laptop Power Bank is once again on sale at Amazon and Walmart for $87.99 ($47 off), which matches the record-low price we last saw at the end of November.

Unless you’ve been living under a proverbial rock for the past several years, you’re probably aware that Anker makes an ungodly amount of charging accessories. The portable A1695 “InstaCord” has quickly become a favorite among Verge staffers, however, owing to the fact that it comes with a retractable USB-C cable and a second that doubles as a handle, both of which are bidirectional and allow for passthrough charging. The 25,000mAh / 90Wh power bank also sports a USB-A port and an additional USB-C port, allowing you to charge your phone, a MacBook Pro, and up to two other devices simultaneously.

In terms of output distribution, Anker’s 600-gram Laptop Power Bank can deliver up to 165W when two devices are plugged in, or up to 130W when charging three or four gadgets. It’s carry-on compliant, too, meaning you shouldn’t have any trouble getting it through TSA while traveling, which isn’t the case if your charger is above the agency’s 100 watt-hours threshold for carry-on devices. It even features a built-in LCD display, allowing you to quickly view the remaining charge, overall power output, battery temperature, and other info at a glance.

Continue Reading

Technology

New malware can read your chats and steal your money

Published

on

New malware can read your chats and steal your money

NEWYou can now listen to Fox News articles!

A new Android banking trojan called Sturnus is shaping up to be one of the most capable threats we have seen in a while. It is still in early development, but it already behaves like a fully mature operation. 

Once it infects a device, it can take over your screen, steal your banking credentials and even read encrypted chats from apps you trust. The worrying part is how quietly it works in the background. You think your messages are safe because they are end-to-end encrypted, but this malware simply waits for the phone to decrypt them before grabbing everything. 

It’s important to note, however, that Sturnus does not break encryption; it only captures messages after your apps decrypt them on your device.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Advertisement

Sturnus malware uses deceptive screens that mimic real banking apps to steal your credentials in seconds. (Kurt “CyberGuy” Knutsson )

A closer look at the malware’s capabilities

Sturnus combines several attack layers that give the operator nearly full visibility into the device, as reported by cybersecurity research firm ThreatFabric. It uses HTML overlays that mimic real banking apps to trick you into typing your credentials. Everything you enter goes straight to the attacker through a WebView that forwards the data instantly. It also runs an aggressive keylogging system through the Android Accessibility Service. This lets it capture text as you type, follow which app is open, and map every UI element on the screen. Even when apps block screenshots, the malware keeps tracking the UI tree in real time, which is enough to reconstruct what you are doing.

NEW ANDROID MALWARE CAN EMPTY YOUR BANK ACCOUNT IN SECONDS

On top of overlays and keylogging, the malware monitors WhatsApp, Telegram, Signal and other messaging apps. It waits for these apps to decrypt messages locally, then captures the text right from the screen. This means your chats may remain encrypted over the network, but once the message appears on your display, Sturnus sees the entire conversation. It also includes a full remote control feature with live screen streaming and a more efficient mode that sends only interface data. This allows precise taps, text injection, scrolling and permission approvals without showing any activity to the victim.

How Sturnus stays hidden and steals money

The malware protects itself by grabbing Device Administrator privileges and blocking any attempt to remove it. If you open the settings page that could disable those permissions, Sturnus detects it immediately and moves you away from the screen before you can act. It also monitors battery state, SIM changes, developer mode, network conditions and even signs of forensic investigation to decide how to behave. All this data goes back to the command-and-control server through a mix of WebSocket and HTTP channels protected with RSA and AES encryption.

Advertisement

When it comes to financial theft, the malware has several ways to take over your accounts. It can collect credentials through overlays, keylogging, UI-tree monitoring and direct text injection. If needed, it can black out your screen with a full-screen overlay while the attacker performs fraudulent transactions in the background. Since the screen is hidden, you have no idea anything is happening until it is too late.

7 ways you can stay safe from Android malware like Sturnus

If you want to protect yourself from threats like this, here are a few practical things you can start doing right away.

1) Install apps only from trusted and verified sources

Avoid downloading APKs from forwarded links, shady websites, Telegram groups or third-party app stores. Banking malware spreads most effectively through sideloaded installers disguised as updates, coupons or new features. If you need an app that isn’t in the Play Store, verify the developer’s official site, check hashes if provided and read recent reviews to make sure the app hasn’t been hijacked.

2) Check permission requests carefully before tapping allow

Most dangerous malware relies on accessibility permissions because they allow full visibility into your screen and interactions. Device administrator rights are even more powerful since they can block removal. If a simple utility app suddenly asks for these, stop immediately. These permissions should only be granted to apps that genuinely need them, such as password managers or accessibility tools you trust.

3) Keep your phone updated

Install system updates as soon as they arrive, since many Android banking trojans target older devices that lack the latest security patches. If your phone is no longer receiving updates, you are at a higher risk, especially when using financial apps. Avoid sideloading custom ROMs unless you know how they handle security patches and Google Play Protect.

Advertisement

HOW ANDROID MALWARE LETS THIEVES ACCESS YOUR ATM CASH

4) Use strong antivirus software

The malware quietly captures decrypted messages from apps like WhatsApp, Telegram and Signal right as they appear on your screen. (Kurt Knutsson)

Android phones come with Google Play Protect built in, which catches a large chunk of known malware families and warns you when apps behave suspiciously. But if you want greater security and control, choose a third-party antivirus app. These tools can alert you when an app starts logging your screen or trying to take over your phone.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

Advertisement

5) Use a personal data removal service

A lot of these campaigns rely on data brokers, leaked databases and scraped profiles to build lists of people to target. If your phone number, email, address or social handles are floating around on dozens of broker sites, it becomes much easier for attackers to reach you with malware links or tailored scams. A personal data removal service helps clean up that footprint by deleting your info from data broker listings.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Treat unusual login screens and pop-ups as red flags

Trojan overlays often appear when you open your bank app or a popular service. If the screen layout looks different or asks for credentials in a way you don’t recognize, close the app completely. Reopen it from your app drawer and see if the prompt returns. If it doesn’t, you probably caught an overlay. Never type banking details into screens that appear suddenly or seem out of place.

Advertisement

With remote control tools that stream your screen and automate taps, attackers can move money behind the scenes without you noticing. (Felix Zahn/Photothek via Getty Images)

7) Be cautious with links and attachments you receive

Attackers frequently distribute malware through WhatsApp links, SMS messages and email attachments pretending to be invoices, refunds or delivery updates. If you receive a link you weren’t expecting, open your browser manually and search for the service instead. Avoid installing anything that comes from a message, even if it appears to be from someone you know. Compromised accounts are a common delivery method.

DATA BREACH EXPOSES 400,000 BANK CUSTOMERS’ INFO

Kurt’s key takeaway

Sturnus is still a young malware family, but it already stands out for how much control it gives attackers. It sidesteps encrypted messaging, steals banking credentials with multiple backup methods, and maintains a strong grip on the device through administrator privileges and constant environmental checks. Even if the current campaigns are limited, the level of sophistication here suggests a threat that is being refined for larger operations. If it reaches wide distribution, it could become one of the most damaging Android banking trojans in circulation.

Have scammers ever tried to trick you into installing an app or clicking a link? How did you handle it? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Sony’s souped-up PlayStation 5 Pro is $100 off for the rest of today

Published

on

Sony’s souped-up PlayStation 5 Pro is 0 off for the rest of today

Sony’s full suite of PlayStation 5 consoles jumped in price in August due to increased US tariffs, but now through Christmas, you can save $100 on several models. This discount is especially great if you planned to go big with Sony’s PS5 Pro, the company’s priciest, most powerful console yet. Normally $749.99, you can currently grab one at Amazon, Walmart, and Target for around $689.99. Sony’s PlayStation Direct storefront indicates that the PS5 Pro sale ends on December 25th at 3AM ET, although discounts may remain on cheaper models.

The PS5 Pro plays many games at their best resolution, while making far fewer concessions than the standard PS5 when it comes to visual effects (particularly ray tracing and shadow quality). Some games simply look better or run faster on the Pro than the base-model PS5, while others look better and run faster. That said, it’s worth noting that PS5 Pro lacks a disc drive and is thus limited to digital titles, though you can buy an optional drive for $80 if you want to attach one later.

The PlayStation 5 Pro has a bigger GPU than any other PS5 model, with twice as much internal storage as the current slim models (2TB versus 1TB). Another notable feature exclusive to the Pro is PSSR (PlayStation Spectral Super Resolution), which uses AI to upscale graphics in supported games to produce a better-looking image. The difference in performance between the Pro and the base PS5 is easy to notice in several games, although it’s safe to say that there hasn’t yet been a title that makes upgrading to one a no-brainer. But if a lower price is all the encouragement you needed to upgrade, now is a good time to get one.

Continue Reading

Trending