“Nearly all” AT&T customers hacked by data breach – now what?
07/17/2024 // Ethan Huff // Views

At least 109 million people living in the United States were hacked by UNC5537 after hackers from the group stole the call records of "nearly all" of AT&T's mobile phone subscribers.

According to reports, not only were pretty much all of AT&T's 109 million subscribers affected, but so were all of the people they interacted with between May 1 and October 21, 2022.

The hack specifically impacted AT&T's Snowflake storage system, which facilitates large-scale data warehousing and analytics in the cloud. Snowflake is now under scrutiny for a number of security lapses in recent years, including multiple instances in which users' credentials were stolen by hackers.

Security firm Mandiant is credited with outing UNC5537 as the culprit in the latest Snowflake breach. Snowflake has since implemented stricter security measures, including mandatory multi-factor authentication (MFA) for all administrators.

Reclaim the Net reported that the stolen data includes all call and text metadata transmitted through the AT&T system between the aforementioned dates. UNC5337 hackers stole said data between April 14 and April 25 of this year.

"This metadata encompasses telephone numbers, interaction counts, and aggregate call durations, affecting not only AT&T's direct customers but also those of various mobile virtual network operators (MVNOs)," the watchdog reported.

(Related: Did you know that all of the major cellphone carriers in the United States allow Big Government to rig and steal elections?)

Be careful: It's an ugly, dangerous world out there

Upon discovering the breach, AT&T is said to have taken immediate action. The carrier engaged with cybersecurity experts as well as contacted the FBI, which along with the Department of Justice (DOJ) issued an official statement about the matter.

Human knowledge is under attack! Governments and powerful corporations are using censorship to wipe out humanity's knowledge base about nutrition, herbs, self-reliance, natural immunity, food production, preparedness and much more. We are preserving human knowledge using AI technology while building the infrastructure of human freedom. Speak freely without censorship at the new decentralized, blockchain-power Brighteon.io. Explore our free, downloadable generative AI tools at Brighteon.AI. Support our efforts to build the infrastructure of human freedom by shopping at HealthRangerStore.com, featuring lab-tested, certified organic, non-GMO foods and nutritional solutions.

Upon investigation, both the Federal Bureau of Investigation and the DOJ determined that both national security and public safety were put at risk by the breach.

"We have taken steps to close off the illegal access points," the two federal agencies announced. "We are working with law enforcement in its efforts to arrest those involved in the incident. We understand that at least one person has been apprehended."

AT&T customers are encouraged to take "several proactive steps to protect their personal information and reduce potential risks." Those steps include:

1) Paying close attention to suspicious calls and texts that could be phishing attempts.

"Customers should be cautious about unsolicited communications asking for personal information or urging them to click on suspicious links."

2) Using MFA, which while required for administrators remains optional for everyone else.

"Avoid using text messages as a form of account verification. This is when a company sends you a code by text message that you have to use to access your account. It's much safer to use a 2-factor authentication app."

3) Stick with app-based calling and texting rather than standard phone calls and SMS text messaging.

"Phone carriers, by virtue of their central role in facilitating communications, inherently collect and store vast amounts of metadata related to phone calls and text messages. This metadata, which includes details such as call times, durations, and the numbers involved, can be highly sensitive. Despite its non-content nature, metadata can reveal intricate details about a person's life, habits and social networks."

Reclaim the Net recommends using what are known as E2EE (end-to-end encryption) apps that ensure all messages, calls and files are encrypted on the sender's device, and that can only be decrypted on the recipient's device.

"This means that no one in between, not even the service providers or potential interceptors, can read or listen to the content," the watchdog says. "This is crucial when the metadata (like call logs and contact numbers) is exposed, as the content of the communications remains secure."

By the way, if you are interested in purchasing a smartphone that is "Google-less" and encrypted at the operating system level, check out Above Phone.

More related news coverage can be found at CyberWar.news.

Sources for this article include:

ReclaimTheNet.org

NaturalNews.com

AbovePhone.com



Related News
Take Action:
Support Natural News by linking to this article from your website.
Permalink to this article:
Copy
Embed article link:
Copy
Reprinting this article:
Non-commercial use is permitted with credit to NaturalNews.com (including a clickable link).
Please contact us for more information.
Free Email Alerts
Get independent news alerts on natural cures, food lab tests, cannabis medicine, science, robotics, drones, privacy and more.
App Store
Android App
eTrust Pro Certified

This site is part of the Natural News Network © 2022 All Rights Reserved. Privacy | Terms All content posted on this site is commentary or opinion and is protected under Free Speech. Truth Publishing International, LTD. is not responsible for content written by contributing authors. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. Truth Publishing assumes no responsibility for the use or misuse of this material. Your use of this website indicates your agreement to these terms and those published here. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners.

This site uses cookies
Natural News uses cookies to improve your experience on our site. By using this site, you agree to our privacy policy.
Learn More
Close
Get 100% real, uncensored news delivered straight to your inbox
You can unsubscribe at any time. Your email privacy is completely protected.