Cybersecurity1 hr ago

ADT Faces Class Action Over Unencrypted Data Exposed in ShinyHunters Voice Phishing Attack

Lawsuit alleges ADT stored customer data unencrypted, enabling ShinyHunters to steal it via voice phishing and publish it on the dark web.

Peter Olaleru/3 min/US

Cybersecurity Editor

TweetLinkedIn
Home Security Firm ADT Breach: 5.5M Customers' Data Exposed

Home Security Firm ADT Breach: 5.5M Customers' Data Exposed

Source: BankinfosecurityOriginal source

TL;DR: Maurice Beckwith filed a class action against ADT in the Southern District of Florida, alleging the company left customer data unencrypted on internet‑accessible networks. The lawsuit says ShinyHunters used a voice phishing attack to steal employee credentials, then accessed and published names, addresses, Social Security numbers and Tax IDs on the dark web.

Context: The complaint was filed on Tuesday. It asserts that ADT’s storage practices allowed attackers to reach sensitive information without encountering encryption barriers. Voice phishing, also called vishing, involves tricking employees into revealing login details over the phone.

Key Facts: According to the filing, ShinyHunters obtained valid employee credentials through the vishing call, used those credentials to log into ADT systems, and exfiltrated customer data. The data reportedly included personal identifiers such as Social Security numbers and Tax IDs, which the group has already posted on dark‑web forums. No specific number of affected records is stated in the complaint.

What It Means: The case underscores two common security gaps: insufficient protection of data at rest and reliance on passwords alone for remote access. If the allegations are proven, ADT could face regulatory scrutiny under state data‑breach laws and potential financial penalties.

Mitigations: Organizations should enforce multi‑factor authentication for all remote and privileged accounts, reducing reliance on credentials obtained via phishing. Regular security awareness training that includes vishing scenarios can help employees recognize and report suspicious calls. Encrypting sensitive data at rest and in transit protects information even if attackers gain network access. Network segmentation limits lateral movement after credential compromise, and monitoring for anomalous login attempts—such as impossible travel or unusual geographic patterns—can detect misuse of stolen credentials. Refer to MITRE ATT&CK technique T1566.002 (Phishing: Voice) and T1078 (Valid Accounts) for detection guidance.

Watch for the court’s response to the complaint, any settlement discussions, and ADT’s public remediation plan, which may set a precedent for how courts view encryption obligations in consumer‑facing services.

TweetLinkedIn

More in this thread

Reader notes

Loading comments...