Friday, 28 November 2025
27.9 C
Singapore
14.5 C
Thailand
20.6 C
Indonesia
28.1 C
Philippines

AT&T data breach exposes call and text logs: What you need to know

AT&T reveals a data breach affecting nearly all wireless customers, exposing call and text logs. Learn how to protect yourself from potential risks.

Data breaches are becoming more common and alarming. This week, AT&T disclosed a significant breach involving the theft of call and text message data logs for almost all its wireless customers.

Details of the breach

The breach, revealed in a securities filing on Friday, involves data from May 1 to October 31, 2022. The stolen logs include phone numbers texted or called by AT&T wireless subscribers and the length and frequency of these calls. However, AT&T clarified that the content of the communications and the exact times of contact were not part of the breach. The compromised call data is limited to U.S. and Canadian numbers.

Nearly all of AT&T’s subscriber base during this period, around 110 million users, have been affected. This includes users of affiliated virtual operators like Cricket and H2O Wireless. Additionally, some records from January 2, 2023, and specific cell phone tower usage were also accessed, potentially allowing hackers to determine the locations of individual phone numbers.

Source of the breach

AT&T identified Snowflake, a third-party cloud storage service, as the source of the breach. Snowflake, also involved in the Ticketmaster data breach in May, has stated that its platform shows no signs of unauthorised access. Despite becoming aware of the breach by late April, AT&T delayed its disclosure until the FBI analysed it to assess potential national security risks.

Preventive measures

While AT&T believes the data has not been publicly released yet, it is wise to take preventive steps to protect yourself and your online presence:

  1. Screen for scam attempts: With personal information potentially available on the dark web, be cautious when someone contacts you using specific details about you. Always verify the legitimacy of the communication before responding. Use official contact methods to follow up on messages, and seek a second opinion from a trusted friend or family member if unsure.
  2. Watch for identity theft: Look for signs of identity theft, such as unexpected mail about new accounts or already-filed taxes. If you notice anything suspicious, act promptly to secure your identity.
  3. Use strong passwords and passkeys: Secure your online accounts with unique, random, and strong passwords. Avoid reusing passwords, especially those containing personal information. A password manager can help you keep track of them.
  4. Enable two-factor authentication: Adding an extra layer of security to your accounts can prevent unauthorised access, even if someone guesses your password.
  5. Lock down social media accounts: Avoid publicly sharing your whereabouts and habits to reduce the risk of scams. If you are concerned about the contents of your chats being revealed, consider switching to encrypted forms of communication.

Despite the frequency of data breaches, they have not yet exposed the intimate details of our personal lives. However, given the increasing scope of these breaches, it seems only a matter of time before more sensitive information is revealed without our consent.

Hot this week

Asia’s boards place AI and digital transformation at the top of 2026 priorities

Nearly half of Asia’s governance leaders plan to prioritise AI in 2026 as digital transformation reshapes board agendas.

Meta explores an AI briefing tool aimed at Facebook users

Meta is developing Project Luna, an AI tool designed to deliver personalised morning Facebook briefings to users.

DBCS launches global design platform and unveils SG Mark 2025 winners

DBCS celebrates 40 years with the launch of WDBO and SG Mark 2025, spotlighting Singapore’s role in global design and innovation.

Warner Music ends lawsuit against Suno after reaching new licensing agreement

Warner Music ends its lawsuit against Suno after securing a licensing deal that gives artists opt-in control over AI-generated music.

Belkin UltraCharge Pro 3-in-1 Magnetic Charging Dock with Qi2 25W review: Fast, quiet and convenient charging

Belkin UltraCharge Pro 3-in-1 Magnetic Charging Dock with Qi2 25W offers fast, quiet and convenient wireless charging for iPhone, Apple Watch and AirPods.

ShadowV2 botnet spotted during AWS outage, researchers warn of possible return

ShadowV2 botnet briefly emerged during the AWS outage, targeting IoT devices, raising concerns about future cyberattacks.

Battlefield 6 launches week-long free-to-play trial for new players

Battlefield 6 launches a week-long free trial with multiple playlists, map access, and progress carryover ahead of its Winter Offensive update.

Sony announces December PS Plus Monthly Games lineup featuring five titles

Sony unveils a five-game PS Plus lineup for December, including Lego Horizon Adventures, Neon White, and several horror titles.

Global mobile gaming ads surge in 2025 as AI and interactivity reshape engagement

Mobile gaming ads grew strongly in 2025 as AI-driven optimisation and interactive formats reshaped global user acquisition strategies.

Related Articles

Popular Categories