ADT Faces Class Action Over Unencrypted Data Exposed in ShinyHunters Voice Phishing Attack
Lawsuit alleges ADT stored customer data unencrypted, enabling ShinyHunters to steal it via voice phishing and publish it on the dark web.

Home Security Firm ADT Breach: 5.5M Customers' Data Exposed
TL;DR: Maurice Beckwith filed a class action against ADT in the Southern District of Florida, alleging the company left customer data unencrypted on internet‑accessible networks. The lawsuit says ShinyHunters used a voice phishing attack to steal employee credentials, then accessed and published names, addresses, Social Security numbers and Tax IDs on the dark web.
Context: The complaint was filed on Tuesday. It asserts that ADT’s storage practices allowed attackers to reach sensitive information without encountering encryption barriers. Voice phishing, also called vishing, involves tricking employees into revealing login details over the phone.
Key Facts: According to the filing, ShinyHunters obtained valid employee credentials through the vishing call, used those credentials to log into ADT systems, and exfiltrated customer data. The data reportedly included personal identifiers such as Social Security numbers and Tax IDs, which the group has already posted on dark‑web forums. No specific number of affected records is stated in the complaint.
What It Means: The case underscores two common security gaps: insufficient protection of data at rest and reliance on passwords alone for remote access. If the allegations are proven, ADT could face regulatory scrutiny under state data‑breach laws and potential financial penalties.
Mitigations: Organizations should enforce multi‑factor authentication for all remote and privileged accounts, reducing reliance on credentials obtained via phishing. Regular security awareness training that includes vishing scenarios can help employees recognize and report suspicious calls. Encrypting sensitive data at rest and in transit protects information even if attackers gain network access. Network segmentation limits lateral movement after credential compromise, and monitoring for anomalous login attempts—such as impossible travel or unusual geographic patterns—can detect misuse of stolen credentials. Refer to MITRE ATT&CK technique T1566.002 (Phishing: Voice) and T1078 (Valid Accounts) for detection guidance.
Watch for the court’s response to the complaint, any settlement discussions, and ADT’s public remediation plan, which may set a precedent for how courts view encryption obligations in consumer‑facing services.
Continue reading
More in this thread
Sandhills Medical Ransomware Attack Exposes Data of 170,000 Patients
Peter Olaleru
Everest Ransomware Claims 3.4M Records Stolen from Citizens and Frost Banks
Peter Olaleru
North Wales Police and Get Safe Online Launch AI Safety Campaign Against Deepfake Scams
Peter Olaleru
Conversation
Reader notes
Loading comments...