Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»ADT confirms data breach after ShinyHunters leak threat
    Cybersecurity

    ADT confirms data breach after ShinyHunters leak threat

    adminBy adminApril 25, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    ADT
    Share
    Facebook Twitter LinkedIn Pinterest Email

    ADT

    Home security giant ADT has confirmed a data breach after the ShinyHunters extortion group threatened to leak stolen data unless a ransom is paid.

    In a statement shared today, the company said it detected unauthorized access to customer and prospective customer data on April 20, after which it terminated the intrusion and launched an investigation.

    This investigation determined that personal information was stolen during the breach.

    image

    “The investigation confirmed that the information involved was limited to names, phone numbers, and addresses,” ADT told BleepingComputer.

    “In a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included. Critically, no payment information — including bank accounts or credit cards — was accessed, and customer security systems were not affected or compromised in any way.”

    ADT says the intrusion was limited and that it has contacted all affected individuals.

    ShinyHunters leak site listing

    This statement follows ADT’s listing on the ShinyHunters data leak site, where attackers claimed to have stolen 10 million records containing customers’ personal information.

    “Over 10M records containing PII and other internal corporate data have been compromised. Pay or Leak,” reads the data leak site.

    “This is a final warning to reach out by 27 Apr 2026 before we leak along with several annoying (digital) problems that’ll come your way.”

    ADT listing on the ShinyHunters data leak site
    ADT listing on the ShinyHunters data leak site

    ADT did not confirm the volume of data theft claimed by the attackers.

    ShinyHunters told BleepingComputer they allegedly breached ADT through a voice phishing (vishing) attack that compromised an employee’s Okta single sign-on (SSO) account. Using this account, the threat actors claimed they accessed and stole data from the company’s Salesforce instance.

    Since last year, the extortion group has been conducting widespread vishing campaigns that target employees and BPO agents’ Microsoft Entra, Okta, and Google SSO accounts.

    After gaining access to a corporate SSO account, the threat actors steal data from connected SaaS applications such as Salesforce, Microsoft 365, Google Workspace, SAP, Slack, Adobe, Atlassian, Zendesk, Dropbox, and many others.

    This stolen data is then used to extort the company into paying a ransom, or the data will be leaked.

    ADT has previously disclosed data breaches in August and October 2024 that exposed customer and employee information.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    ADT Breach confirms data leak ShinyHunters threat
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article3 frameworks that drive execution
    Next Article 10 Hacks Every YouTube Music User Should Know
    admin
    • Website

    Related Posts

    North Korea’s Lazarus Targets macOS Users via ClickFix

    April 25, 2026

    26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

    April 25, 2026

    Indirect prompt injection is taking hold in the wild

    April 25, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    8 SEO tasks you shouldn’t do manually

    April 25, 2026

    North Korea’s Lazarus Targets macOS Users via ClickFix

    April 25, 2026

    This duster changed the way I clean my gear, and now you can grab one for cheap

    April 25, 2026

    26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

    April 25, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,501)
    • Privacy & Online Earning (183)
    • SEO & Digital Marketing (922)
    • Tech Tools & Mobile / Apps (1,786)
    • WiFi / Internet & Networking (246)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    8 SEO tasks you shouldn’t do manually

    April 25, 2026

    North Korea’s Lazarus Targets macOS Users via ClickFix

    April 25, 2026

    This duster changed the way I clean my gear, and now you can grab one for cheap

    April 25, 2026
    Most Popular
    • 8 SEO tasks you shouldn’t do manually
    • North Korea’s Lazarus Targets macOS Users via ClickFix
    • This duster changed the way I clean my gear, and now you can grab one for cheap
    • 26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases
    • Why Google Has Changed & Who’s Really Paying for It
    • The Galaxy Z Fold 8 Wide might use a familiar aspect ratio
    • Indirect prompt injection is taking hold in the wild
    • 10 Hacks Every YouTube Music User Should Know
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.