Share this article on:
An arrest has been made relating to the April cyber attack on US multinational telco AT&T.
On 12 July, AT&T advised its customers that between 14 April and 25 April 2024, threat actors downloaded the data of its customers on a third-party platform.
The compromised data includes “records of calls and texts of nearly all of AT&T’s cellular customers, customers of mobile virtual network operators (MVNOs) using AT&T’s wireless network, as well as AT&T’s landline customers who interacted with those cellular numbers”, AT&T said.
According to the telco, nearly all of its customers were affected, of which it has 114.5 million.
Now, just days after it reportedly paid a $370,000 ransom payment, AT&T said that through its collaboration with law enforcement, an arrest relating to the incident has been made.
“We continue to work with law enforcement in their efforts to arrest those involved. Based on information available to us, we understand that at least one person has been apprehended,” said AT&T.
It is unclear who was arrested and whether they were from ShinyHunters – the threat group that was paid the ransom – or Reddington, who was contacted by the hacker believed to be John Erin Binns, best known for hacking T-Mobile’s database.
AT&T did, however, confirm that the access point used by the threat actors to hack its network has been secured.
Cyber Daily will continue to provide updates on this piece as more information becomes available.
ShinyHunters has been a problem for AT&T in the past, having leaked a dataset of over 72 million users in April 2022, for which it asked for $200,000.
When the ransom was not paid, the data was posted online and has popped up on multiple occasions.