Security

Cyber-crime

Call, text logs for 110M AT&T customers stolen from compromised cloud storage

Snowflake? Snowflake


AT&T has admitted that cyberattackers grabbed a load of its data for the second time this year, and if you think the first haul was big, you haven't seen anything: This latest one includes data on "nearly all" AT&T wireless customers - and those served by mobile virtual network operators (MVNOs) running on AT&T's network. 

The American telco giant disclosed today that a security "breach" at a "third-party cloud platform" resulted in the theft of call and text metadata, though not of any personal information belonging to customers.

Nonetheless, some customers could be at risk because "a subset" of records contained in that online storage included one or more cell tower identification numbers, allowing snoops to potentially roughly geolocate a customer whose data was stolen in the attack. 

An AT&T spokesperson told The Register call and text records – specifically the details of those interactions, not the content – for just under 110 million customers were snatched from the compromised cloud storage.

That 110 million figure is basically 2022's total subscriber count minus IoT devices and additional lines, we're told. AT&T told us the final number includes affected MVNO customers. 

AT&T said it doesn't believe any of the customer data stolen in the attack has been published online (yet), and that at least one person has been arrested by the FBI in connection to the theft of its records. 

The FBI didn't directly answer our questions regarding the arrest, only saying that it had been working with AT&T on the matter since shortly after the incident was discovered in mid-April.

It's interesting that AT&T was asked by the US Dept of Justice to delay public disclosure of this latest theft, until now, on the grounds that it might affect national security or public safety.

"AT&T is working with law enforcement in its efforts to arrest those involved in the incident," the telco said in its big reveal today via the SEC. "Based on information available to AT&T, it understands that at least one person has been apprehended."

One more flake in the snow bank

For those seeing "third party cloud platform" and immediately assuming this is related to those earlier intrusions into the user accounts of cloud provider Snowflake - you'd be correct. AT&T is yet another high-profile customer caught up in the digital ransacking of Snowflake user accounts by miscreants using stolen customer login credentials.

If you've missed the avalanche, it's believed about 165 companies had their internal data pilfered earlier this year from their individual Snowflake online database storage spaces.

It's believed the crooks performed credential stuffing – using stolen username and password combinations to see if those combos also work with Snowflake – to access some people's Snowflake cloud storage. User credentials in at least some cases were obtained by info-stealing malware on victims' computers.

That is to say, Snowflake itself wasn't compromised in a way that allowed the data to be stolen; it was all swiped from individual customer accounts via underhandedly obtained valid logins.

Investigators at Mandiant believe affected Snowflake customers didn't have multifactor authentication enabled on their accounts. Snowflake has since made MFA mandatory for all instances. 

We asked AT&T if it had forgotten to enable MFA on its Snowflake account, and that question went unanswered. 

Along with AT&T, the mass intrusion into Snowflake instances has affected companies like Ticketmaster and its Australian equivalent Ticketek, US auto supply store Advance Auto Parts, international bank Santander, and lots more.

AT&T said in March that records belonging to 73 million current and former customers were published on the dark web, making this latest admission the second massive customer data exposure it has experienced this year, though it is believed the data exposed in March was stolen several years ago.

The telco told us the two incidents are unrelated, and has repeatedly asserted that the data stolen in the previous attack didn't come from its systems, either. ®

Send us news
22 Comments

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

AT&T to shell out $950,000 after quad-state 911 outage

Service takes another dive just as settlement is announced

Plane tracker app FlightAware admits user data exposed for years

Privacy blunder alert omits number of key details

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

National Public Data tells officials 'only' 1.3M people affected by intrusion

Investigators previously said the number was much, much higher

RansomHub-linked EDR-killing malware spotted in the wild

Also: Your external-facing NetSuite sites need a review; five popular malware varieties for Q2, and more

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

Shots fired as AT&T and Verizon ask FCC to block Starlink's direct-to-cell plans

Rivals claim signal waiver would interfere with terrestrial networks

Snowflake claims Iceberg wins table format wars, and Databricks has just proved it

The data analytics vendor's CEO says rival's over $1 billion Tabular acquisition is the 'vindication'