Trending

HomeBlog
ShinyHunters Selling Alleged AT&T Database with 70 million SSN and Date of birth; AT&T Denies it originated from their systems
Cyble-Featured-Cyble-ShinyHunters-AT&T-database-RaidForums

ShinyHunters Selling Alleged AT&T Database with 70 million SSN and Date of birth; AT&T Denies it originated from their systems

Cyble's research on ShinyHunters selling alleged AT&T database affecting over 70 Million users' SSNs and DoBs.

It was not a long ago when we encountered a massive data breach at T-mobile, which affected millions of users’ SSN, mobile numbers, driving licenses, etc. This time it seems to be different, and perhaps, more concerning.

The notorious cybercriminal group, ShinyHunters, claims to have gained access to the AT&T database, affecting over 70 Million users’ SSNs and Dates of Birth.

Figure 1: ShinyHunters Post for Selling AT&T database on RaidForums

The actor has put the database for an auction, as shown in the image below.

Figure 2: ShinyHunters group are willing to sell this for $1 Million as a flash sale

ShinyHunters Linked Data Breaches

Several high-profile breaches since 2020 are linked to this group directly. Some of them are below (source: Wikipedia):

Figure 3: ShinuHunters Group linked data breaches. Source – https://en.wikipedia.org/wiki/ShinyHunters
Figure 4: ShinuHunters Group linked data breaches. Source – https://en.wikipedia.org/wiki/ShinyHunters

It should be noted that the group is being investigated by multiple law enforcement agencies worldwide, including the FBI.

Failed Extortion Attempt?

The research community has seen a change in its tactics in the last few months. The ShinyHuntes group extorts their victims and often shares their RaidForum profile and media press on the credibility of their claims. If a victim refuses to pay the extortion, the group puts them for sale on cybercrime forums.

report-ad-banner
Figure 5: ShinyHunters Profile on RaidForums Website

Conclusion  

The ShinyHunters group is a known and credible threat actor. The claims made by the group can not be discounted, given their history. On this issue, whether they were able to breach AT&T’s infrastructure, found a misconfigured databases on the internet, or compromised the third party with AT&T information, time will tell us.

Update: “Based on our investigation today, the information that appeared in an internet chat room does not appear to have come from our systems.” AT&T commented on the issue.

If the claims are genuine, this might be one of the most sensitive data breaches of 2021.

At the time of writing this blog, there are no known reports or disclosure by AT&T on this alleged data breach.

Our Recommendations 

We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the suggestions given below: 

  • Use strong passwords and enforce multi-factor authentication wherever possible. 
  • Turn on the automatic software update feature on your computer, mobile, and other connected devices wherever possible and pragmatic.  
  • Use a reputed anti-virus and internet security software package on your connected devices.     
  • Refrain from opening untrusted links and email attachments without verifying their authenticity. 
  • Conduct regular backup practices and keep those backups offline or in a separate network. 

About Us 

Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from cybercrimes and exposure in the Darkweb. Its prime focus is to provide organizations with real-time visibility to their digital risk footprint. Backed by Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Start-ups To Watch In 2020. Headquartered in Alpharetta, Georgia, and with offices in Australia, Singapore, and India, Cyble has a global presence. To learn more about Cyble, visit www.cyble.com.  

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading