AT&T 称犯罪分子在数据泄露中窃取了“几乎所有”客户的电话记录
AT&T says criminals stole phone records of 'nearly all' customers in data breach

原始链接: https://techcrunch.com/2024/07/12/att-phone-records-stolen-data-breach/

4 月 14 日,美国电信公司 AT&T 宣布发生重大数据泄露事件,影响到其几乎所有移动和固定电话客户。 超过 1.1 亿用户的记录已被泄露,其中包含 2022 年 5 月 1 日至 2022 年 10 月 31 日六个月内的电话号码、通话记录(包括发起联系的人)以及交换短信的详细信息。 还访问了 2023 年 1 月 2 日以来未公开的客户子集的某些较新记录。 此外,如果您的电话连接由另一家利用 AT&T 基础设施的运营商提供服务,您的数据也可能会受到影响。 泄露的数据并没有透露任何对话内容,尽管它确实提供了关键的元数据,包括通话时长和通信次数。 与特定呼叫相关的手机信号塔 ID 等数据点可以潜在地指示这些交互的地理位置。 在最近针对 Snowflake 客户端的一系列攻击中,泄露的数据源自云存储提供商 Snowflake。 目前尚不清楚为什么 AT&T 将客户数据存储在 Snowflake 上,或者他们是否强制执行多因素身份验证来保护访问。 尽管多家使用 Snowflake 的企业都经历过类似的数据盗窃事件,但 Snowflake 本身声称其客户未能实施强大的安全措施,例如多因素身份验证,导致他们容易受到攻击。 安全分析师将这些违规行为归因于一个未知的犯罪组织,标记为 UNC5537。 该组织似乎是受经济驱动的,由位于北美的特工和至少一名位于土耳其的成员组成。 针对此次泄露事件,AT&T 表示,他们不认为被盗数据目前存在于可公开访问的平台中。 他们正在与当局合作追查并逮捕责任人,有报道称一名嫌疑人已被拘留。 根据联邦调查局发布的声明,由于担心国家安全和公共安全可能受到威胁,最初延迟通知公众和客户。

在美国,AT&T 和 Verizon 等主要无线提供商因从客户那里收集大量个人数据而闻名。 虽然两家运营商都保留了大量数据,但两者之间存在差异。 具体来说,AT&T 将短信内容、元数据和通话记录存储七年,而 Verizon 保留类似数据的时间较短。 然而,两家公司出于执法目的保留有关通话和短信活动的详细记录长达七年。 这些记录可以根据要求恢复。 与无线提供商的自愿数据收集做法相反,尽管欧盟努力促进该地区的数据主权,但欧盟公民可能会对各自执法机构可能进行的大规模监视表示担忧。 一些人认为,由于执法部门利用了漏洞,GDPR 等数据隐私法规缺乏有效性。 为了回应有关电话跟踪和数据泄露的担忧,一项提案建议为过渡到完全可追踪的电话系统设定严格的期限,其中每个电话都可以通过网络进行追踪,并有 100% 的保证。 支持者建议通过允许用户最初选择加入来逐步实施此实施,然后逐渐收紧限制,直到所有呼叫都完全可追踪。 此外,美国无线运营商中还出现了一个名为“竞选注册表”的第三方组织。 该注册表是为政治广告目的而创建的,在严格的审查过程中收集纳税识别号 (TIN) 和社会安全号 (SSN),以批准通过短信发送的政治广告。 此外,该登记处还禁止露骨的色情、暴力、毒品或枪支相关内容,以保护消费者。 因此,批评者将竞选登记处视为一种私人审查形式。
相关文章

原文

U.S. phone giant AT&T confirmed Friday it will begin notifying millions of consumers about a fresh data breach that allowed cybercriminals to steal the phone records of “nearly all” of its customers, a company spokesperson told TechCrunch.

In a statement, AT&T said that the stolen data contains phone numbers of both cellular and landline customers, as well as AT&T records of calls and text messages — such as who contacted who by phone or text — during a six-month period between May 1, 2022 and October 31, 2022. 

AT&T said some of the stolen data includes more recent records from January 2, 2023 for a smaller but unspecified number of customers.

The stolen data also includes call records of customers with phone service from other cell carriers that rely on AT&T’s network, the company said. 

AT&T said the stolen data “does not contain the content of calls or texts,” but does include calling and texting records that an AT&T phone number interacted with during the six-month period, as well as the total count of a customer’s calls and texts, and call durations — information that is often referred to as metadata. The stolen data does not include the time or date of calls or texts, AT&T said.

Some of the stolen records include cell site identification numbers associated with phone calls and text messages, information that can be used to determine the approximate location of where a call was made or text message sent.

In all, the phone giant said it will notify around 110 million AT&T customers of the data breach, company spokesperson Andrea Huguely told TechCrunch. 

AT&T published a website with information for customers about the data incident. AT&T also disclosed the data breach in a filing with regulators before the market opened on Friday.

AT&T said it learned of the data breach on April 19, and that it was unrelated to its earlier security incident in March. 

AT&T’s Huguely told TechCrunch that the most recent compromise of customer records were stolen from the cloud data giant Snowflake during a recent spate of data thefts targeting Snowflake’s customers.

Snowflake allows its corporate customers, like tech companies and telcos, to analyze huge amounts of customer data in the cloud. It’s not clear for what reason AT&T was storing customer data in Snowflake, and the spokesperson would not say.

AT&T is the latest company in recent weeks to confirm it had data stolen from Snowflake, following Ticketmaster and LendingTree subsidiary QuoteWizard, and others.

Snowflake blamed the data thefts on its customers for not using multi-factor authentication to secure their Snowflake accounts, a security feature that the cloud data giant did not enforce or require its customers to use. 

Cybersecurity incident response firm Mandiant, which Snowflake called in to help with notifying customers, later said about 165 Snowflake customers had a “significant volume of data” stolen from their customer accounts

Mandiant attributed the breach to an as-yet-uncategorized cybercriminal group tracked only as UNC5537. Mandiant’s researchers say the hackers are financially motivated and have members in North America and at least one member in Turkey. 

Some of the other corporate victims of the Snowflake account thefts had data subsequently published on known cybercrime forums. For AT&T’s part, the company said that it does not believe that the data is publicly available at this time.

AT&T’s statement said it was working with law enforcement to arrest the cybercriminals involved in the breach. AT&T said that “at least one person has been apprehended.” AT&T’s spokesperson said that the arrested individual was not an AT&T employee, but deferred questions about the alleged criminals to the FBI.

An FBI spokesperson confirmed to TechCrunch on Friday that after the phone giant contacted the agency to report the breach, AT&T, the FBI and the Department of Justice agreed to delay notifying the public and customers on two occasions, citing “potential risks to national security and/or public safety.”

“AT&T, FBI, and DOJ worked collaboratively through the first and second delay process, all while sharing key threat intelligence to bolster FBI investigative equities and to assist AT&T’s incident response work,” the FBI spokesperson said.

The FBI did not comment on the arrest of one of the alleged cybercriminals.

This is the second security incident AT&T has disclosed this year. AT&T was forced to reset the account passcodes of millions of its customers after a cache of customer account information — including encrypted passcodes for accessing AT&T customer accounts — was published on a cybercrime forum. A security researcher told TechCrunch at the time that the encrypted passcodes could be easily decrypted, prompting AT&T to take precautionary action to protect customer accounts.

Read more on TechCrunch:

Updated with comment from the FBI.

联系我们 contact @ memedata.com