Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
We do not use cookies of this type.
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.
We do not use cookies of this type.
Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
We do not use cookies of this type.
Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.
We do not use cookies of this type.
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
We do not use cookies of this type.
AT&T Paid a Hacker $370,000 to Delete Stolen Phone Records. The cost of the incident will be a multiple of over 100 times that cost.
Worst Nightmare:
The hacker, who is part of the notorious ShinyHunters hacking group that has stolen data from a number of victims through unsecured Snowflake cloud storage accounts, told WIRED that AT&T paid the ransom in May. He provided the address for the cryptocurrency wallet that sent the currency to him, as well as the address that received it.
Whilst potentially tens of millions of users of AT&T, and Snowflake data has been exfiltrated, both organizations remain unbelievably completely exposed to further intrusion, exfiltration, and cybercrime.
Some 150 other organizations have potentially been exploited via Snowflake. Interestingly Sridhar Ramaswamy ignored our information sharing on the 8 June 2024 as well as several other Snowflake members of the Executive team.
What is being overlooked is the fact AT&T work closely, very closely with the U.S. Government and Federal Agencies. That fact alone is truly frightening. The fact cyberattacks, via Insecure Internet Assets and Servers enable, with literally zero viscosity, access up and down the entire supply chain is truly concerning.