Broadcast United

Important Security Notice: AT&T Incident and Precautions

Broadcast United News Desk
Important Security Notice: AT&T Incident and Precautions

[ad_1]

Important Security Notice: AT&T Incident and Precautions

July 16, 2024

Explore other posts on these topics:

As a trusted partner in cybersecurity, Intermedia is committed to keeping you informed about potential threats and how to protect yourself. Today, we would like to highlight a recent incident involving AT&T and emphasize the importance of remaining vigilant when facing cyber threats. It is important to note that this incident is not related to Intermedia’s systems or services. We are sharing this information only to help you stay safe.

AT&T incident

AT&T recently reported a major security incident where call and text logs from its vendor Snowflake were stolen. The breach affected most, if not all, AT&T mobile customers, with records stolen from May 1, 2022 to October 31, 2022 and January 2, 2023. While the actual content of calls and text messages was not compromised, the stolen metadata included information about who communicated with whom. Scammers can use this data to impersonate trustworthy individuals and trick you into revealing personal information.

How scammers use stolen data

Stolen metadata can be used in “phishing” scams, where attackers alter caller ID information to make it look like a trusted contact is contacting you. They can then pretend to be someone you know and trick you into handing over sensitive information or money.

What is Phishing?

Phishing is a cyberattack in which an attacker attempts to trick an individual into revealing sensitive information, such as usernames, passwords, credit card numbers, or other personal information. These attacks often take the form of spoofed emails, text messages, or phone calls that appear to be from legitimate sources, such as a bank, online service, or even an acquaintance.

Common types of phishing attacks include:

  • Email Phishing: This involves sending fraudulent emails that appear to come from a reputable source. The emails typically contain a message urging the recipient to click a link or download an attachment, which directs the recipient to a fake website designed to steal their information.
  • Spear Phishing: Spear phishing is a more targeted form of phishing where the attacker sends a personalized message to a specific person or organization. These messages often contain personal information to make them more convincing.
  • SMS Phishing (SMS Phishing): This type of phishing uses text messages to trick victims into clicking on malicious links or providing personal information.
  • Voice Vishing (Voice Phishing): Phishing occurs when an attacker calls someone pretending to be a legitimate entity, such as a bank or government agency, in order to steal the victim’s personal information.

Phishing scams use social engineering techniques to exploit human psychology. Attackers often create a sense of urgency or fear to prompt the victim to take immediate action without giving the victim time to seriously consider the request.

Protect yourself and your organization

To protect yourself and your organization from potential scams resulting from this incident, please follow these suggestions:

  1. Be careful with your caller ID information. Caller ID can be easily spoofed, so don’t rely solely on it to verify the identity of a caller.
  2. Authenticate sensitive requests. If you receive a call or text asking for money, passwords, or other confidential information, hang up and call back from a number you know is real. Consider using a secure communication method, such as an encrypted messaging app like Signal.
  3. Be wary of requests for personal information. Legitimate organizations will not ask for personal, account or credit card details via text or phone.
  4. Ignore text messages from unknown senders. Do not reply or click on links in text messages from unknown numbers.
  5. Keep updating. Regularly check for updates and advice from trusted sources, such as the Federal Communications Commission (FCC) and mobile providers, to avoid fraud and scams.

Continued fight against cybercrime

Intermedia invests heavily in providing highly secure products, services and 24/7 system monitoring. This commitment also extends to making consumers aware of potential security threats.

Please continue to monitor our social channels and website/blog for more information on system security and protection, including Intermedia-hosted security webinars, security checklists, security videos, and more. We are committed to helping you stay safe and vigilant in the face of cyber threats.

Jonathan Levine is CTO of Intermedia

July 16, 2024

Explore other posts on these topics:

[ad_2]

Source link

Share This Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *