ADT Breach Exposes 5.5 Million Emails via Okta SSO Voice Phishing
A ShinyHunters breach exposed 5.5 million ADT customer emails and data through voice phishing against an Okta SSO account. Learn the details and mitigation strategies.

TL;DR
ShinyHunters compromised 5.5 million ADT customer email addresses by stealing an employee's Okta single sign-on credentials through a voice phishing attack. The security incident exposed various customer data points but did not affect payment information.
### Context Security provider ADT recently confirmed a data breach affecting its customer base. The incident, attributed to the hacking group ShinyHunters, compromised critical customer data.
### Key Facts ADT detected unauthorized access to customer data on April 20, immediately initiating its incident response protocols. Threat actors gained entry to ADT's Salesforce account by employing voice phishing, also known as vishing, to steal an employee's Okta single sign-on (SSO) credentials. This method involves using deceptive phone calls to trick individuals into revealing sensitive information.
The breach exposed 5.5 million unique email addresses belonging to ADT customers. Beyond email addresses, the compromised data included customer names, phone numbers, and physical addresses. In a minority of cases, Social Security and Tax ID numbers were also accessed. ADT reported no compromise of payment information.
ShinyHunters, a known hacking organization, has previously targeted companies like Rockstar Games, Crunchyroll, and Bumble. Their method of exploiting SSO via phishing aligns with recent incidents, including a separate breach involving Panera Bread.
### What It Means The exposure of sensitive personal information creates a significant risk for affected individuals, potentially leading to targeted phishing campaigns, identity theft, or other forms of fraud. Customers should remain vigilant against unsolicited communications. For organizations, this breach underscores the persistent threat of social engineering tactics, particularly vishing attacks against SSO systems.
### What Defenders Should Do Organizations must implement robust defenses against voice phishing attacks. This includes mandatory multi-factor authentication (MFA) for all single sign-on (SSO) systems, ideally using phishing-resistant methods like FIDO2 security keys rather than SMS or push notifications.
Regular and thorough employee training is crucial, focusing on identifying social engineering tactics, including sophisticated vishing attempts. Organizations should also enforce strict access controls, limiting employee access to critical systems like Salesforce only to necessary personnel. Rapid incident response plans, including forensic investigation capabilities, are essential for containing breaches quickly.
Businesses must continuously update their security postures to counter evolving social engineering threats and protect critical credentials.
Continue reading
More in this thread
Sandhills Medical Ransomware Attack Exposes Data of 170,000 Patients
Peter Olaleru
ADT Faces Class Action Over Unencrypted Data Exposed in ShinyHunters Voice Phishing Attack
Peter Olaleru
Everest Ransomware Claims 3.4M Records Stolen from Citizens and Frost Banks
Peter Olaleru
Conversation
Reader notes
Loading comments...