{"id":56565,"date":"2024-07-12T14:33:05","date_gmt":"2024-07-12T14:33:05","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/36097\/Nearly-All-AT-T-Cell-Customers-Call-And-Text-Records-Exposed.html"},"modified":"2024-07-12T14:33:05","modified_gmt":"2024-07-12T14:33:05","slug":"nearly-all-att-cell-customers-call-and-text-records-exposed","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/","title":{"rendered":"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/media.cnn.com\/api\/v1\/images\/stellar\/prod\/gettyimages-2032904960.jpg?c=16x9&amp;q=w_800,c_fill\" class=\"ff-og-image-inserted\"><\/div>\n<div data-uri=\"cms.cnn.com\/_components\/source\/instances\/clyhyqlkh000lndqgcyiw8pj1@published\" class=\"source inline-placeholder\" data-article-gutter=\"true\"> <cite class=\"source__cite\"> <span class=\"source__location\" data-editable=\"location\"><\/span> <span class=\"source__text\" data-editable=\"source\">CNN<\/span> &nbsp;\u2014&nbsp; <\/cite>\n<\/div>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhyqlkh000mndqgg9qt44m6@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> The call and text message records from mid-to-late 2022 of tens of millions of AT&amp;T cellphone customers and many non-AT&amp;T customers were exposed in a massive data breach, the telecom company revealed Friday. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyisnqhk00013b6kcp38ue5t@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T said the compromised data includes the telephone numbers of \u201cnearly all\u201d of its cellular customers and the customers of wireless providers that use its network between May 1, 2022 and October 31, 2022. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiugqdo00003b6kdssgmo9u@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> The stolen logs also contain a record of every number AT&amp;T customers called or texted \u2013 including customers of other wireless networks \u2013 the number of times they interacted, and the call duration. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiuh4eb00023b6k03hq3pq3@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> Importantly, AT&amp;T said the stolen data did not include the contents of calls and text messages nor the time of those communications. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiso12s00033b6kid8l50gp@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> The records of a \u201cvery small number\u201d of customers from January 2, 2023, were also implicated, AT&amp;T said. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiu36tm000f3b6klfttymrh@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> \u201cWe have an ongoing investigation into the AT&amp;T breach and we\u2019re coordinating with our law enforcement partners,\u201d <a href=\"https:\/\/x.com\/FCC\/status\/1811773460739223630\" target=\"_blank\" rel=\"noopener\">the FCC said on social media platform X<\/a>. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhyrtbx0008356k8k1gr8j9@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> The company&nbsp;<a href=\"https:\/\/www.sec.gov\/ix?doc=\/Archives\/edgar\/data\/0000732717\/000073271724000046\/t-20240506.htm\" target=\"_blank\" rel=\"noopener\">blamed<\/a>&nbsp;an \u201cillegal download\u201d on a third-party cloud platform that it learned about in April \u2013 just as the company was grappling with an&nbsp;<a href=\"https:\/\/www.cnn.com\/2024\/03\/30\/tech\/att-data-leak\/index.html\">unrelated major data leak.<\/a> <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyimncfy00043b6klr8wu4pm@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T says that the exposed data is not believed to be publicly available, however CNN was unable to independently verify that assertion. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiu6i7o000i3b6kvc8uuuj8@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T spokesperson Alex Byers told CNN that this was an entirely new incident that had \u201cno connection in any way\u201d to another incident disclosed in March. At that time, AT&amp;T said personal information such as Social Security numbers on 73 million current and former customers was released onto the dark web. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiu6n94000k3b6kv05nxgcp@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> \u201cWe sincerely regret this incident occurred and remain committed to protecting the information in our care,\u201d the company said in a statement about the latest breach. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhyrtby000b356koy33uu7i@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T listed approximately 110 million wireless subscribers as of the end of 2022. AT&amp;T said international calls were not included in the stolen data, with the exception of calls to Canada. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhyrtby000c356k5wzlc8aw@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> The breach also included AT&amp;T landline customers who interacted with those cell numbers. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhzmxo40005356kn0arlgg1@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T said that contents of the calls or texts, personal information such as Social Security numbers, dates of birth, or customer names were not exposed in this incident, however the company acknowledged that publicly available tools can often link names with specific phone numbers. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhyrtby000d356kyrzjztli@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> Additionally, AT&amp;T said that for an undisclosed subset of its records, one or more cell site identification numbers linked to the calls and texts were also exposed. Such data could reveal the broad geographic location of one or more of the parties. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyj28gx300003b6ltfu0pra8@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T believes that at least one person involved in the cybercriminal incident is in custody, the company said in a filing with the Securities and Exchange Commission. The FBI declined to comment when asked about that statement. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhyrtby000f356kl2wwks85@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T promised to notify current and former customers whose information was involved and provide them resources to protect their information. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhyrtby000h356kmv9nf1jf@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> Usage details such as the time of calls and text messages were not compromised either. But AT&amp;T spokesperson Byers told CNN that the number of calls and text messages, and total call durations for specific days or months were exposed. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyirldth00083b6k8807erg3@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> That means the data would not identify precisely when one phone number called another but could reveal how often two parties called each other \u2013 and how long they spoke for \u2013 on specific days. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyikaakb00023b6ku3ugo2nu@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T said it learned on April 19 that a \u201cthreat actor claimed to have unlawfully accessed and copied AT&amp;T call logs.\u201d The company said it \u201cimmediately\u201d hired experts and a subsequent investigation determined hackers had exfiltrated files between April 14 and April 25. <\/p>\n<h2 class=\"subheader\" data-editable=\"text\" data-uri=\"cms.cnn.com\/_components\/subheader\/instances\/clyiu923n000r3b6k25pvo6ye@published\" data-component-name=\"subheader\" id=\"justice-department-delays-public-disclosure\" data-article-gutter=\"true\"> Justice Department delays public disclosure<br \/>\n<\/h2>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyikbk0u00043b6koyzf9c75@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> The company said the US Department of Justice Department determined in May and in June that a delay in public disclosure was warranted. The FBI said AT&amp;T reached out shortly after learning about the hack, but the agency wanted to review the data for potential national security or public safety risks. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiqnoow0000356k21s6kqfu@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> \u201cIn assessing the nature of the breach, all parties discussed a potential delay to public reporting\u2026 due to potential risks to national security and\/or public safety,\u201d the FBI said in a statement. \u201cAT&amp;T, FBI, and DOJ worked collaboratively through the first and second delay process, all while sharing key threat intelligence to bolster FBI investigative equities and to assist AT&amp;T\u2019s incident response work.\u201d <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyj2lc2h00043b6lc0tj2gfp@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> This appears to be the first cyber incident in which the Justice Department has asked a company to delay filing a disclosure with the SEC because of potential national security or public safety concerns. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiuy9d400063b6kkp5ejsix@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> \u201cThis is very concerning. This information is very valuable to cyber criminals and to nation-states,\u201d Sanaz Yashar, co-founder and CEO of cybersecurity firm Zafran, told CNN. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiuyczx00083b6kdnaoxeut@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> Yashar, previously an Israeli cyber spy, said threat actors can correlate the cell ID data with other information readily available to pinpoint where someone works \u2013 including at sensitive locations like the White House and Pentagon. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyiuyp8g000e3b6kgin1jp57@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> \u201cYou don\u2019t need the timestamp. If someone is there everyday, you can understand they work there and their routine. This is very secret information and a way that spies do stuff.\u201d <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyj4r73v000m3b6lcqc6srcx@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> Justin Sherman, founder of Global Cyber Strategies, a consultancy, also put the potential threat in stark terms. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyj4s99n000r3b6l9vus5gzy@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> \u201cMetadata about who\u2019s communicating with who, at massive scale, enables someone to map connections between people \u2014 think journalists and sources, intelligence officers and their contacts, married people and those with whom they\u2019re having an affair,\u201d Sherman told CNN. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyj2ltxh00003b6krwj8izny@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> Jason Hogg, a former FBI special agent who is now executive-in-residence at Great Hill Partners, said the cell site data is \u201cquite significant because it could allow bad actors to determine certain consumers\u2019 geolocation, which could be used to make the social engineering attacks more believable.\u201d <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyimitfk00003b6k8ysrzd86@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T shares fell 1% on Friday following the news. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhyrtby000j356k6nrxwjyj@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> In the new incident, AT&amp;T told CNN it learned in April that customer data was illegally downloaded from its workspace on Snowflake, a third-party cloud platform. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyj3qta100003b6lrjopc6sg@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T is only the latest major company to have data stolen via access to their Snowflake platform. Ticketmaster and Santander Bank have also recently disclosed massive data breaches linked to Snowflake. Mandiant, a Google-owned cybersecurity firm, has notified at least 165 organizations that they may have been affected by the hacking spree. Mandiant analysts <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/unc5537-snowflake-data-theft-extortion\" target=\"_blank\" rel=\"noopener\">said<\/a> they have \u201cmoderate confidence\u201d that the hackers are based in North America and that they collaborate with an additional person in Turkey. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyimkkiv00023b6k0lxe0a9u@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> Brad Jones, chief information security officer at Snowflake, told CNN in a separate statement that the company has not found evidence this activity was \u201ccaused by a vulnerability, misconfiguration or breach of Snowflake\u2019s platform.\u201d Jones said this has been verified by investigations by third-party cybersecurity experts at Mandiant and CrowdStrike. <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyhyrtby000k356kaicx7n4c@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> AT&amp;T said it launched an investigation, hired cybersecurity experts and took steps to close the \u201cillegal access point.\u201d <\/p>\n<p class=\"paragraph inline-placeholder vossi-paragraph-primary-core-light\" data-uri=\"cms.cnn.com\/_components\/paragraph\/instances\/clyimcg0a0000356kcm5e1m1k@published\" data-editable=\"text\" data-component-name=\"paragraph\" data-article-gutter=\"true\"> <em>This story has been updated with additional context and developments.<\/em> <\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/36097\/Nearly-All-AT-T-Cell-Customers-Call-And-Text-Records-Exposed.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":56566,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10982],"class_list":["post-56565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyphonedata-lossspyware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T14:33:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.cnn.com\/api\/v1\/images\/stellar\/prod\/gettyimages-2032904960.jpg?c=16x9&amp;q=w_800,c_fill\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed\",\"datePublished\":\"2024-07-12T14:33:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/\"},\"wordCount\":1197,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/nearly-all-att-cell-customers-call-and-text-records-exposed.jpg\",\"keywords\":[\"headline,privacy,phone,data loss,spyware\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/\",\"name\":\"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/nearly-all-att-cell-customers-call-and-text-records-exposed.jpg\",\"datePublished\":\"2024-07-12T14:33:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/nearly-all-att-cell-customers-call-and-text-records-exposed.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/nearly-all-att-cell-customers-call-and-text-records-exposed.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nearly-all-att-cell-customers-call-and-text-records-exposed\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,phone,data loss,spyware\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyphonedata-lossspyware\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/","og_locale":"en_US","og_type":"article","og_title":"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-07-12T14:33:05+00:00","og_image":[{"url":"https:\/\/media.cnn.com\/api\/v1\/images\/stellar\/prod\/gettyimages-2032904960.jpg?c=16x9&amp;q=w_800,c_fill","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed","datePublished":"2024-07-12T14:33:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/"},"wordCount":1197,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/nearly-all-att-cell-customers-call-and-text-records-exposed.jpg","keywords":["headline,privacy,phone,data loss,spyware"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/","url":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/","name":"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/nearly-all-att-cell-customers-call-and-text-records-exposed.jpg","datePublished":"2024-07-12T14:33:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/nearly-all-att-cell-customers-call-and-text-records-exposed.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/07\/nearly-all-att-cell-customers-call-and-text-records-exposed.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nearly-all-att-cell-customers-call-and-text-records-exposed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,phone,data loss,spyware","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyphonedata-lossspyware\/"},{"@type":"ListItem","position":3,"name":"Nearly All AT&amp;T Cell Customers\u2019 Call And Text Records Exposed"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56565"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56565\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/56566"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}