Monday, 24 November 2025
31.2 C
Singapore
28.6 C
Thailand
29.1 C
Indonesia
28.1 C
Philippines

AT&T data breach exposes call and text logs: What you need to know

AT&T reveals a data breach affecting nearly all wireless customers, exposing call and text logs. Learn how to protect yourself from potential risks.

Data breaches are becoming more common and alarming. This week, AT&T disclosed a significant breach involving the theft of call and text message data logs for almost all its wireless customers.

Details of the breach

The breach, revealed in a securities filing on Friday, involves data from May 1 to October 31, 2022. The stolen logs include phone numbers texted or called by AT&T wireless subscribers and the length and frequency of these calls. However, AT&T clarified that the content of the communications and the exact times of contact were not part of the breach. The compromised call data is limited to U.S. and Canadian numbers.

Nearly all of AT&T’s subscriber base during this period, around 110 million users, have been affected. This includes users of affiliated virtual operators like Cricket and H2O Wireless. Additionally, some records from January 2, 2023, and specific cell phone tower usage were also accessed, potentially allowing hackers to determine the locations of individual phone numbers.

Source of the breach

AT&T identified Snowflake, a third-party cloud storage service, as the source of the breach. Snowflake, also involved in the Ticketmaster data breach in May, has stated that its platform shows no signs of unauthorised access. Despite becoming aware of the breach by late April, AT&T delayed its disclosure until the FBI analysed it to assess potential national security risks.

Preventive measures

While AT&T believes the data has not been publicly released yet, it is wise to take preventive steps to protect yourself and your online presence:

  1. Screen for scam attempts: With personal information potentially available on the dark web, be cautious when someone contacts you using specific details about you. Always verify the legitimacy of the communication before responding. Use official contact methods to follow up on messages, and seek a second opinion from a trusted friend or family member if unsure.
  2. Watch for identity theft: Look for signs of identity theft, such as unexpected mail about new accounts or already-filed taxes. If you notice anything suspicious, act promptly to secure your identity.
  3. Use strong passwords and passkeys: Secure your online accounts with unique, random, and strong passwords. Avoid reusing passwords, especially those containing personal information. A password manager can help you keep track of them.
  4. Enable two-factor authentication: Adding an extra layer of security to your accounts can prevent unauthorised access, even if someone guesses your password.
  5. Lock down social media accounts: Avoid publicly sharing your whereabouts and habits to reduce the risk of scams. If you are concerned about the contents of your chats being revealed, consider switching to encrypted forms of communication.

Despite the frequency of data breaches, they have not yet exposed the intimate details of our personal lives. However, given the increasing scope of these breaches, it seems only a matter of time before more sensitive information is revealed without our consent.

Hot this week

LinkedIn introduces AI-powered search to help users find the right people

LinkedIn introduces AI-powered search to help users find relevant people more quickly, starting with Premium members in the US.

Lenovo posts record quarterly revenue as hybrid AI strategy gains momentum

Lenovo reports record quarterly revenue as AI devices, hybrid infrastructure, and services drive strong performance.

Google TV may introduce solar-powered remote controls

Google TV may soon feature a solar-powered remote, reducing battery waste and offering an eco-friendly solution for streaming devices.

Call of Duty: Black Ops 7 faces backlash from players over AI-generated content

Players slam Call of Duty: Black Ops 7 over AI-generated art and gameplay issues despite strong critical reviews.

Roblox’s selfie verification hints at a more intrusive online future

Roblox’s new age verification system signals a growing shift toward identity checks across online platforms, raising safety and privacy concerns.

Belkin Zootopia accessories you need before Zootopia 2 arrives

Belkin’s latest Zootopia collection brings fun designs and practical features to power banks, cables, cases and straps for everyday use.

Meta explores an AI briefing tool aimed at Facebook users

Meta is developing Project Luna, an AI tool designed to deliver personalised morning Facebook briefings to users.

Final Fantasy Tactics remake brings renewed challenge to modern consoles

A modern remake of Final Fantasy Tactics brings updated visuals, classic strategy gameplay and steep challenges to today’s major consoles.

HP and Dell turn off HEVC support on selected laptop models

HP and Dell turn off HEVC support on selected laptops, limiting browser playback and prompting users to rely on third-party software.

Related Articles

Popular Categories