Home Hack ADT Admits Security Breach After Hackers Advertise Stolen Data On The Dark...

ADT Admits Security Breach After Hackers Advertise Stolen Data On The Dark Web

Image: ADT

By Jay Peters

 

Security company ADT disclosed in an SEC filing that hackers obtained “some limited customer information, including email addresses, phone numbers and postal addresses.” TechCrunch reports that ADT’s disclosure follows a seller on a cybercrime forum claiming last week that they had obtained more than 30,000 stolen ADT customer records.

The hackers obtained the information by accessing “certain databases containing ADT customer order information,” according to ADT. The company believes that only a “small percentage” of its subscribers were affected and says it has notified those customers. (ADT has about 6 million customers, according to a June blog post.) ADT says that it has “no reason to believe” that the hackers compromised home security systems and that credit card data and banking information weren’t taken.

Faith Based Events

“Our customers’ privacy and security is our utmost priority, and we have taken several steps to help keep their information safe, including immediately activating rigorous cybersecurity protocols,” ADT spokesperson Ben Tamblyn says in a statement.

Here’s the relevant text from ADT’s SEC filing:

ADT Inc. (“ADT” or the “Company”) recently experienced a cybersecurity incident during which unauthorized actors illegally accessed certain databases containing ADT customer order information. After becoming aware of the incident, the Company promptly took steps to shut down the unauthorized access and launched an investigation, partnering with leading third-party cybersecurity industry experts. The attackers nonetheless obtained some limited customer information, including email addresses, phone numbers and postal addresses.
Based on its investigation to date, the Company has no reason to believe that customers’ home security systems were compromised during this incident. Additionally, the Company has no reason to believe the attackers obtained other personally sensitive information such as credit card data or banking information. The Company is continuing its investigation into this cybersecurity incident and has notified the customers it believes to have been affected, who comprise a small percentage of the Company’s overall subscriber base. While the investigation remains ongoing, as of the date of this filing, the Company believes this cybersecurity incident has not materially impacted its operations and does not expect that this incident is reasonably likely to have a material impact on the Company’s overall financial condition, results of operations, or ability to meet its 2024 financial guidance.

Disclaimer

The information contained in South Florida Reporter is for general information purposes only.
The South Florida Reporter assumes no responsibility for errors or omissions in the contents of the Service.
In no event shall the South Florida Reporter be liable for any special, direct, indirect, consequential, or incidental damages or any damages whatsoever, whether in an action of contract, negligence or other tort, arising out of or in connection with the use of the Service or the contents of the Service. The Company reserves the right to make additions, deletions, or modifications to the contents of the Service at any time without prior notice.
The Company does not warrant that the Service is free of viruses or other harmful components


This article originally appeared here and was republished with permission.

The Verge is an ambitious multimedia effort founded in 2011 to examine how technology will change life in the future for a massive mainstream audience. Our original editorial insight was that technology had migrated from the far fringes of the culture to the absolute center as mobile technology created a new generation of digital consumers. Now, we live in a dazzling world of screens that has ushered in revolutions in media, transportation, and science. The future is arriving faster than ever.