{"id":55784,"date":"2024-04-01T16:50:00","date_gmt":"2024-04-01T16:50:00","guid":{"rendered":"http:\/\/51d70ab0-4727-448f-9b7b-a0c4b1504ee4"},"modified":"2024-04-01T16:50:00","modified_gmt":"2024-04-01T16:50:00","slug":"att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/","title":{"rendered":"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/aef1e5739a167accfcf40064ae16fcd308d2a4c8\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=768\" alt=\"data-breach.png\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/42fbf2ee0c275c847511b665aeb0b04bfe111630\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1024\" alt=\"data-breach.png\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/402825868509f906d57120cb02f43897d421b43c\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280\" alt=\"data-breach.png\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/402825868509f906d57120cb02f43897d421b43c\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280\" alt=\"data-breach.png\" width=\"1280\" height=\"711.1111111111111\" fetchpriority=\"low\"><\/picture><\/div>\n<\/p><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">AT&amp;T\/ZDNET<\/span><\/figcaption><\/figure>\n<p>Millions of AT&amp;T customers may have been affected by a data leak, forcing the carrier to change their passcodes. In a <a href=\"https:\/\/www.att.com\/support\/article\/my-account\/000101995\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">notice posted on Saturday<\/a>, AT&amp;T said that data seemingly from 2019 and earlier was leaked on the dark web, impacting 7.6 million current AT&amp;T subscribers and 65.4 million former AT&amp;T account holders.<\/p>\n<p>The scope of the leaked data found on the dark web varies from account to account. In addition to passcodes for all affected customers, it may also include full names, email addresses, mailing addresses, phone numbers, social security numbers, dates of birth, and AT&amp;T account numbers. The carrier said that the dataset does not contain any personal financial information or call history.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/why-were-millions-of-at-t-customers-left-disconnected-we-have-an-answer\/\" rel=\"follow\">Why were millions of AT&amp;T customers left disconnected? We have an answer<\/a><\/strong><\/p>\n<p>AT&amp;T said the company sent emails or letters to all current and former subscribers who were impacted by the leak. In addition to resetting customer passcodes, the company urged customers to monitor their account activity and credit reports. To do so yourself, you can set up free fraud alerts with <a href=\"https:\/\/www.equifax.com\/personal\/credit-report-services\/credit-fraud-alerts\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Equifax<\/a>,&nbsp;<a href=\"https:\/\/www.experian.com\/fraud\/center.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Experian<\/a>, and&nbsp;<a href=\"https:\/\/www.transunion.com\/fraud-alerts\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">TransUnion<\/a>, and review a free credit report through <a href=\"https:\/\/www.freecreditreport.com\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">Freecreditreport.com<\/a>.<\/p>\n<p>&#8220;The severity of this data breach is significantly heightened because of the Personal Identifiable Information (PII), including full names, email addresses, mailing addresses, phone numbers, Social Security numbers, dates of birth, AT&amp;T account numbers, and passcodes, that were part of the compromised data,&#8221; Anne Cutler, a cybersecurity evangelist at Keeper Security, told ZDNET. &#8220;The immediate concern is the potential exploitation of this exposed data, which could lead to various malicious activities such as identity theft, phishing attacks, and unauthorized access to user accounts.&#8221;<\/p>\n<p>If you&#8217;re an AT&amp;T subscriber affected by this breach, change your passcode. To do that, go to your&nbsp;<a href=\"https:\/\/www.att.com\/acctmgmt\/passthrough\/PROFILEOVERVIEW?origination_point=eSupport\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">myAT&amp;T profile<\/a>&nbsp;page and sign in when prompted. Scroll to the section for &#8220;My linked accounts,&#8221; select Edit for the passcode you want to change, and follow the prompts.<\/p>\n<p><!----><\/p>\n<p>Cutler advises you may want to take other steps as well.<\/p>\n<p>&#8220;Proactive steps individuals can and should take immediately include changing login information for their account with AT&amp;T, getting a dark web monitoring service, monitoring or freezing their credit and practicing good cyber hygiene,&#8221; Cutler said. &#8220;By using strong and unique passwords for every account, enabling MFA everywhere possible, updating software regularly, and always thinking before they click, individuals can greatly increase their personal cybersecurity.&#8221;<\/p>\n<p>AT&amp;T said that its internal staff is working with outside cybersecurity experts to investigate the matter. For now, the company doesn&#8217;t know whether the leaked data came from its own systems or that of one of its vendors. AT&amp;T said the carrier hasn&#8217;t found any signs of unauthorized access to its systems that may have resulted in the theft of customer data.<\/p>\n<p>AT&amp;T apparently learned about the data leak last Monday. That&#8217;s when <a href=\"https:\/\/techcrunch.com\/2024\/03\/30\/att-reset-account-passcodes-customer-data\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">TechCrunch informed the carrier<\/a> that the information discovered on the dark web contained encrypted passcodes that could be used to access subscriber accounts. A security researcher told TechCrunch that the encrypted passcodes would be easy to decrypt. TechCrunch said that it held off publishing its story until AT&amp;T could start resetting account passcodes.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-101-everything-on-how-to-protect-your-privacy-and-stay-safe-online\/\" rel=\"follow\">Everything on how to protect your privacy and stay safe online<\/a><\/strong><\/p>\n<p>Should AT&amp;T have known about the data leak sooner? In 2021, a hacker <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/atandt-denies-data-breach-after-hacker-auctions-70-million-user-database\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">claimed to be selling a dataset<\/a> that contained the personal information of 70 million subscribers, as then reported by Bleeping Computer. At the time, AT&amp;T told Bleeping Computer that the information did not appear to come from its systems and couldn&#8217;t speculate where it came from or whether it was valid.<\/p>\n<p>Last month, someone published all the alleged records on a dark web forum, according to TechCrunch. A more detailed analysis of the data allowed AT&amp;T customers to confirm that the <a href=\"https:\/\/www.troyhunt.com\/inside-the-massive-alleged-att-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">leaked data was accurate<\/a>.<\/p>\n<p>&#8220;Detecting a breach is never an easy task, and most industry data supports that it takes (on average) approximately 200+ days to detect a security breach,&#8221; BigID CISO Tyler Young told ZDNET. &#8220;Companies should know what data they have and, more importantly, be aware of what sensitive information, such as social security numbers and addresses, they have on file in case a breach like this occurs. It is a common misconception that only small companies without the proper resources are vulnerable to attacks.&#8221;<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/at-t-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The hacked data seems to be from 2019 or earlier and could include customer names, email addresses, phone numbers, social security numbers, passcodes, and more.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-55784","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-01T16:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/402825868509f906d57120cb02f43897d421b43c\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying\",\"datePublished\":\"2024-04-01T16:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/402825868509f906d57120cb02f43897d421b43c\\\/2023\\\/07\\\/26\\\/d8214a38-a86a-4674-aaae-8c643c6164c5\\\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/\",\"name\":\"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/402825868509f906d57120cb02f43897d421b43c\\\/2023\\\/07\\\/26\\\/d8214a38-a86a-4674-aaae-8c643c6164c5\\\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2024-04-01T16:50:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/402825868509f906d57120cb02f43897d421b43c\\\/2023\\\/07\\\/26\\\/d8214a38-a86a-4674-aaae-8c643c6164c5\\\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/402825868509f906d57120cb02f43897d421b43c\\\/2023\\\/07\\\/26\\\/d8214a38-a86a-4674-aaae-8c643c6164c5\\\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/","og_locale":"en_US","og_type":"article","og_title":"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-04-01T16:50:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/402825868509f906d57120cb02f43897d421b43c\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying","datePublished":"2024-04-01T16:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/"},"wordCount":776,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/402825868509f906d57120cb02f43897d421b43c\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/","url":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/","name":"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/402825868509f906d57120cb02f43897d421b43c\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280","datePublished":"2024-04-01T16:50:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/402825868509f906d57120cb02f43897d421b43c\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/402825868509f906d57120cb02f43897d421b43c\/2023\/07\/26\/d8214a38-a86a-4674-aaae-8c643c6164c5\/zdnets-best-at-t-phones.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/att-resets-passcodes-for-7-6-million-customers-after-data-leak-what-experts-are-saying\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"AT&amp;T resets passcodes for 7.6 million customers after data leak. What experts are saying"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55784"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55784\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}