Checklist 384: A Very Un-Fun Snow Day
Massive Data Breach Hits AT&T: 110 Million Customers Affected
In a recent podcast discussion, it was highlighted that AT&T has confirmed a significant data breach, potentially affecting nearly all of its wireless customers and customers of various mobile virtual network operators (MVNOs). The breach, which occurred between April 14 and April 25 this year, exposed records of customer call and text interactions from May 1 to October 31, 2022, and January 2, 2023. This hack could potentially impact about one-third of the US population.
Scope and Impact
According to a report by The Hacker News, the MVNOs affected include:
- Black Wireless
- Boost Infinite
- Consumer Cellular
- Cricket Wireless
- FreedomPop
- FreeUp Mobile
- Good2Go
- H2O Wireless
- PureTalk
- Red Pocket
- Straight Talk Wireless
- TracFone Wireless
- Unreal Mobile
- Wing
The stolen data was stored with Snowflake, a cloud data platform, which previously faced criticism following a separate incident involving Ticketmaster.
Snowflake’s Role and Response
The breach has highlighted issues with Snowflake’s data security practices. TechCrunch reported that Snowflake enables its corporate customers, including telcos like AT&T, to analyze massive amounts of customer data. Snowflake claimed the breach resulted from customers not using multi-factor authentication (MFA), though this was not a mandatory requirement for using the platform.
WIRED further revealed that the hackers behind the Snowflake data theft obtained credentials from dark web services, including those through a third-party contractor named EPAM Systems.
Financial Motivations and Fallout
The financial motivation behind the hack is clear, with demands for ransoms ranging from $300,000 to $5 million. The cybercriminal group, identified by Google-owned Mandiant as UNC5537, operates primarily out of North America with collaboration from a member in Turkey.
Future Precautions
In response to the breach, Snowflake announced it will now enforce mandatory MFA for all users and will soon require MFA for new accounts to mitigate future risks. However, the damage is already done for the millions of consumers whose data has been compromised.
While corporate entities like AT&T and Snowflake navigate the fallout, it is ultimately the consumers who bear the brunt of the breach. With sensitive information stolen and potentially misused, the incident underscores the urgent need for robust data security measures across the board.
Sources: The Hacker News, TechCrunch, WIRED
AT&T Data Breach Exposes Call and Text Records of 110 Million Customers
AT&T recently disclosed a massive data breach that compromised the phone records of nearly 110 million wireless and landline customers, exposing sensitive information and call data. The breach, spanning from April 14 to April 25, revealed records from May 1 to October 31, 2022, and January 2, 2023.
Nature of the Data Compromised
In a statement covered by TechCrunch, AT&T confirmed that the stolen data included phone numbers and records of calls and text messages, detailing who contacted whom. Additionally, 9to5Mac reported that hackers also accessed cell site identification numbers for some communications, potentially pinpointing customer locations within 300 feet.
Scope and Implications
Despite the severity of the breach, The Hacker News clarified that the compromised data did not include the content of calls or texts, nor personal information like Social Security numbers or dates of birth. However, AT&T admitted in a Form 8-K filing with the U.S. Securities and Exchange Commission that publicly available tools could link phone numbers to individuals’ names.
Jake Williams, a former NSA hacker and faculty member at IANS Research, emphasized the gravity of the situation, noting that the stolen data, known as call data records (CDR), is invaluable for intelligence analysis. These records can reveal intricate details about who communicates with whom and when, posing a significant threat to individuals at all levels, from CEOs to senators.
AT&T’s Response and Security Measures
In response to the breach, AT&T has set up an information site offering tips for protecting personal data:
- Only open text messages from known and trusted senders.
- Avoid replying to unknown texts with personal details.
- Navigate directly to company websites instead of using links from text messages.
- Ensure websites are secure by checking for “https” in the URL and looking for a lock icon.
AT&T assured customers that the access point used in the breach has been secured, emphasizing that protecting customer data is a top priority.
While AT&T works to mitigate the fallout, the breach underscores the need for robust data security practices. With sensitive call and text records exposed, the incident highlights the risks associated with data storage and the importance of maintaining stringent security measures to protect customer information.
Sources: The Hacker News, TechCrunch, 9to5mac
Snowflake Security Lapse Exposes Ticketmaster Data in Latest Breach
In a continuation of data security concerns, the podcast “Checklist No. 378 – Probable Ticketmaster Data Breach” revisited the issues involving Snowflake and Ticketmaster, highlighting failures in multi-factor authentication (MFA) protocols.
Breach Details
Previously discussed was the breach of Ticketmaster’s data, which was facilitated by the lack of MFA or 2FA on their Snowflake account. This security lapse mirrors the recent AT&T breach, raising significant concerns about data protection measures.
Joint Statement and Contradictory Findings
In early June, Snowflake, in collaboration with cybersecurity firms CrowdStrike and Mandiant, issued a statement denying any evidence of vulnerabilities, misconfigurations, or breaches within Snowflake’s platform. They also claimed that no compromised credentials from current or former Snowflake personnel were involved.
However, a report by WIRED contradicted this claim, revealing that hackers had obtained stolen Snowflake credentials through a contractor, EPAM Systems. Using a remote-access Trojan, the attackers accessed an EPAM worker’s computer, uncovering unencrypted usernames and passwords used to manage EPAM customers’ Snowflake accounts, including Ticketmaster’s.
Criticism and Security Implications
The podcast criticized both Ticketmaster and Snowflake for their security oversights. Snowflake faced additional scrutiny for not mandating MFA, especially given the volume of sensitive information handled by their servers.
This incident underscores the need for robust security practices, particularly for companies managing large datasets. Implementing mandatory MFA is a critical step to prevent similar breaches in the future.
The repeated data breaches involving major companies like AT&T and Ticketmaster highlight significant gaps in cybersecurity protocols. As sensitive information continues to be at risk, the responsibility falls on both service providers and their customers to enforce stringent security measures.
Sources: SC Magazine, WIRED, CrowdStrike, Mandiant