ADT reveals cyberattack leaked customer emails and home addresses – here’s what we know so far
ADT has announced that it has suffered a data breach in which customer information was stolen and subsequently leaked online.
The home security giant confirmed the news in a Form 8-K Regulatory Filing with the U.S. Securities and Exchange Commission (SEC), stating that third parties were able to access the systems and steal customer data.
It also said that “limited” information had been obtained by accessing past orders of a small percentage of customers, including email addresses, phone numbers and postal addresses.
ADT Data Breach
“ADT Inc. recently experienced a cyber incident in which unauthorized individuals illegally gained access to certain databases containing ADT customer order information,” the filing said.
“Upon becoming aware of the incident, the company took immediate steps to block the unauthorized access and launched an investigation, working with leading third-party cybersecurity experts.”
ADT said there was no evidence that any additional customer information, such as credit card or banking details, was compromised and that the company’s security systems were also secure.
The leaked data was later leaked on the infamous Breached forums by a poster named “netnsher”. He claimed to have access to a database containing over 30,812 records, including 30,400 unique email addresses.
TechRadar Pro has contacted ADT, which claimed in June 2024 to have six million customers, for comment but has not yet received a response.
However, a company spokesperson told our sister site Tom’s guide“ADT has determined that an unauthorized individual has gained access to certain ADT customer data. The company has taken immediate action; implementing our cybersecurity protocols, increasing our alert levels, and initiating a forensic investigation of our systems.”
“We can confirm that no home security systems of our customers have been compromised and that no confidential information, credit card details or banking details have been accessed.”