Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

ASUS Armoury Crate Bug Exposes Windows to Admin Takeover

June 16, 2025

US Critical Infrastructure at Risk Amid Iran-Israel Tensions

June 16, 2025

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » 49M Phone Numbers Exposed: SSNs and DOBs Linked in Major Data Breach
Cyberattacks

49M Phone Numbers Exposed: SSNs and DOBs Linked in Major Data Breach

Staff WriterBy Staff WriterJune 5, 2025No Comments4 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email

Quick Takeaways

  1. A threat actor has re-released data from a 2021 AT&T breach affecting approximately 70 million customers, now linking Social Security numbers and birth dates directly to individual users.

  2. AT&T is investigating the situation, confirming that the data originates from the known breach and has been repackaged for sale on dark web forums.

  3. The leaked data, initially stolen in 2021 and now cleaned up, contains over 88 million lines, with 86 million unique records, including sensitive personal information such as phone numbers and encrypted Social Security numbers.

  4. This incident reiterates that the leak is not from a new data breach but is a rearrangement of previously disclosed information from the 2021 breach.

What’s the Problem?

In a troubling cybersecurity development, a threat actor has resurrected data from a 2021 breach involving AT&T, endangering 70 million customers by integrating previously distinct files to directly associate Social Security numbers and birthdates with individual accounts. This rehashed data surfaced on a Russian-speaking hacking forum, where the perpetrator misleadingly claimed it was part of a newer breach, the infamous 2024 AT&T Snowflake attack. AT&T, when contacted by BleepingComputer, confirmed that the data indeed originated from the 2021 breach, which was perpetrated by well-known hacker ShinyHunters and had previously attempted to sell the information for $200,000.

The implications of this repackaged leak are significant, as it now contains unencrypted personal identifiers not found in the original release. Initial reports from AT&T, which at first denied the legitimacy of the data, eventually acknowledged impact on 73 million customers. BleepingComputer’s analysis reveals that while the latest leak showcases over 88 million data entries, many are duplicitous, resulting in a mere 86 million unique records, encompassing nearly 48.9 million distinct phone numbers alongside personal identifiable information. This incident underscores a chilling reminder of the persistent vulnerabilities inherent in digital data management, illustrating how cybercriminals exploit past breaches for renewed financial gain.

Risks Involved

The recent re-emergence of AT&T’s 2021 data breach, now meticulously repackaged to expose sensitive information such as Social Security numbers and birth dates of nearly 70 million customers, poses a grave risk not only to AT&T but also to other organizations, users, and the broader business ecosystem. This repackaged data enhances the potential for identity theft and fraud, compelling consumers to take defensive measures that strain their relationships with multiple businesses reliant on trust and customer data security. For organizations, the ramifications are multi-faceted: elevated scrutiny from regulators, diminished consumer confidence, and the financial burden of remediating breaches while bolstering cybersecurity measures. Moreover, as threat actors leverage this data for phishing and social engineering attacks, companies across various sectors may find themselves unwittingly entangled in the fallout, potentially leading to reputational damage and heightened liability concerns. Thus, the re-release of this sensitive information serves as an urgent reminder of the cascading effects cybersecurity incidents can have in an increasingly interconnected digital landscape.

Possible Actions

The urgency of addressing the AT&T data leak cannot be overstated; with Social Security numbers and dates of birth now linked to a staggering 49 million phone numbers, the ramifications for individuals and organizations alike could be catastrophic.

Mitigation Steps

  1. Immediate Notification: Alert affected individuals promptly to facilitate swift protective measures.
  2. Identity Theft Protection: Offer affected individuals access to credit monitoring and identity theft protection services.
  3. Data Analysis: Conduct a detailed investigation to understand the extent and mechanics of the breach.
  4. Encryption: Enhance encryption protocols for sensitive information to preempt future vulnerabilities.
  5. Policy Revamp: Reassess and fortify data governance policies and incident response plans to incorporate lessons learned.
  6. Stakeholder Communication: Maintain transparent communication with stakeholders regarding ongoing remediation efforts.
  7. Training Programs: Implement comprehensive training for employees on data protection best practices.
  8. Regular Audits: Schedule frequent security audits to assess and address potential weaknesses proactively.

NIST CSF Guidance
NIST Cybersecurity Framework emphasizes the need for a structured response to data breaches, primarily under its Identify, Protect, Detect, Respond, and Recover functions. For specific remedial actions, refer to NIST Special Publication 800-61, which details incident handling and computer security.

Stay Ahead in Cybersecurity

Stay informed on the latest Threat Intelligence and Cyberattacks.

Access world-class cyber research and guidance from IEEE.

Disclaimer: The information provided may not always be accurate or up to date. Please do your own research, as the cybersecurity landscape evolves rapidly. Intended for secondary references purposes only.

Cyberattacks-V1

CISO Update Cybersecurity MX1
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleIntroducing the BarracudaONE AI-Powered Cybersecurity Platform
Next Article Sangfor Powered by Veeam Sets to Deliver Enterprise-Grade Data Protection
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

ASUS Armoury Crate Bug Exposes Windows to Admin Takeover

June 16, 2025

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 2025

Hack Attack: Journalists’ Accounts Compromised

June 16, 2025

Comments are closed.

Latest Posts

ASUS Armoury Crate Bug Exposes Windows to Admin Takeover

June 16, 20250 Views

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 20250 Views

Hack Attack: Journalists’ Accounts Compromised

June 16, 20250 Views

Anubis Ransomware: Total File Encyption and Wipe Threatens Recovery

June 16, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

ASUS Armoury Crate Bug Exposes Windows to Admin Takeover

June 16, 2025

US Critical Infrastructure at Risk Amid Iran-Israel Tensions

June 16, 2025

8.4 Million Users’ Data Breached in Zoomcar Hack

June 16, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.