ShinyHunters Claims 10M Records Stolen in ADT Breach Exposing 5.5M Customers
Home security firm ADT confirms a breach exposing 5.5 million customer records. The ShinyHunters group claims 10 million stolen via social engineering and Okta compromise.

Home Security Firm ADT Breach: 5.5M Customers' Data Exposed
TL;DR
Home security provider ADT disclosed a data breach exposing the personal information of 5.5 million customers, while the ShinyHunters extortion group claims to have stolen over 10 million records. The incident highlights ongoing threats from prolific cybercriminal groups leveraging social engineering tactics.
On April 20, home security giant ADT reported unauthorized access to certain cloud-based environments to the U.S. Securities and Exchange Commission. The company stated its belief that only limited customer and prospective customer data was accessed, and that the breach would not significantly impact its financial performance. This marks at least the third reported data incident for ADT since August 2024.
The ShinyHunters extortion group quickly listed ADT on its data leak blog, claiming responsibility for the breach. The group asserts it stole over 10 million records, encompassing both personal and corporate data. Breach-tracking service Have I Been Pwned corroborated the exposure of 5.5 million unique email addresses, along with customer names, physical addresses, and phone numbers. In a smaller subset of cases, dates of birth and the last four digits of government-issued identification numbers were also compromised. ADT confirmed that payment card data and customer security systems remained unaffected.
ShinyHunters, a persistent cybercrime group known for targeting organizations like Harvard and Match Group, reportedly exploited ADT's Okta security software through social engineering. This tactic, where attackers manipulate individuals to gain access, allowed the group to then access and exfiltrate data from the company's Salesforce instance. This incident aligns with ShinyHunters' typical modus operandi, which often involves compromising single sign-on (SSO) solutions and then targeting customer relationship management (CRM) systems. The fact that 71% of the exposed email addresses were already present in other breach databases underscores the cumulative risk of personal data exposure across multiple incidents.
What Defenders Should Do: Organizations must fortify their defenses against social engineering, a primary attack vector for groups like ShinyHunters. Implementing strong multi-factor authentication (MFA) across all systems, especially single sign-on (SSO) platforms like Okta, is crucial. Regular security awareness training for employees, emphasizing the dangers of phishing and social engineering calls, directly mitigates this risk. Additionally, enterprises should enforce robust access controls and least privilege principles for cloud environments and critical business applications like Salesforce, regularly auditing configurations for misconfigurations that could expose data. Organizations should also monitor their Salesforce instances for suspicious activity, including unusual data exports or access patterns, and promptly investigate any alerts.
Organizations should enhance their vigilance against sophisticated social engineering campaigns and secure critical cloud-based platforms to prevent future data exfiltration attempts.
Continue reading
More in this thread
Pawn America Pays $3.185 Million to Settle 2021 Data Breach Lawsuit
Peter Olaleru
Pawn America Settles 2021 Data Breach Class Action for $3.185 Million
Peter Olaleru
Pitney Bowes Confirms Salesforce Breach After Phishing, ShinyHunters Claims 25M Records Leaked
Peter Olaleru
Conversation
Reader notes
Loading comments...