ADT Data Breach



ADT suffered a confirmed data breach on April 20, 2026, linked to the ShinyHunters extortion group, exposing customer names, phone numbers, and addresses — with some cases including dates of birth and the last four digits of SSNs or Tax IDs. No financial data or home security systems were compromised.

ADT detected unauthorized access to customer and prospective customer data on April 20, 2026. The intrusion was quickly terminated, and ADT launched a forensic investigation with third‑party cybersecurity experts while notifying law enforcement.

The threat actor ShinyHunters claimed responsibility, stating they stole over 10 million records and threatened to leak the data unless ADT paid a ransom. ADT has not confirmed the 10M figure but acknowledges a breach occurred.

What Data Was Exposed

ADT states the compromised data includes:

  • Names

  • Phone numbers

  • Addresses

  • In a small percentage of cases:

    • Dates of birth

    • Last four digits of SSNs or Tax IDs

Critically:

  • No payment information (bank accounts, credit cards) was accessed.

  • No ADT home security systems or monitoring services were affected.


How the Attack Happened

ShinyHunters told investigators they gained access through a voice‑phishing (vishing) attack that compromised an employee’s Okta SSO account. From there, they accessed ADT’s Salesforce environment and exfiltrated data.

This aligns with ShinyHunters’ broader campaign targeting Microsoft Entra, Okta, and Google SSO accounts across multiple industries.

Risks to Customers

Even though financial data wasn’t exposed, the stolen PII can still enable:

  • Phishing and social‑engineering attacks

  • Identity theft attempts

  • Account takeover attempts using personal details

ADT has notified affected individuals and is offering identity protection services.

Recommended Actions

If you or your organization uses ADT services, consider:

  • Monitoring for phishing attempts using your ADT‑related info

  • Enabling fraud alerts with credit bureaus

  • Reviewing account activity for unusual behavior

  • Using strong MFA on all accounts, especially those tied to home or business security


Popular posts from this blog

WSUS CVE-2025-59287 Mitigation

Cloud Infrastructures are Having a Bad Week

CVE-2025-58034 Fortinet Warnings and Mitigation