Home alarm company ADT says hackers obtained ‘limited’ customer data

Avatar

The home security systems company ADT Inc. announced Wednesday that unauthorized hackers unlawfully broke into some databases storing customer order information.

The company said the incident happened “recently” but did not provide the date for the intrusion, according to a filing with the Securities and Exchange Commission (SEC).

ADT said that once it learned of the incident, it quickly worked to block the unauthorized access and began investigating the hack with the help of external cybersecurity experts.

Attackers made off with “limited” customer information, including email addresses, phone numbers and home addresses, ADT said. 

The company said its probe has turned up no evidence that customers’ home security systems were accessed and that there is no sign the hackers accessed sensitive data such as customer banking information or credit card data.

ADT said it is still investigating the hack and has let the impacted customers know their information was obtained. The company also said the affected customers “comprise a small percentage of the company’s overall subscriber base.” 

“While the investigation remains ongoing, as of the date of this filing, the company believes this cybersecurity incident has not materially impacted its operations,” an ADT statement in the SEC filing said.

CybercrimeNewsNews BriefsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

UN cybercrime treaty passes in unanimous vote

Next Post

Hackers return $12 million taken during Ronin network breach

Related Posts

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor's malicious payload into an external process, waitfor.exe,
Avatar
Read More

VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware

Cybersecurity researchers have uncovered two malicious extensions in the Visual Studio Code (VSCode) Marketplace that are designed to deploy ransomware that's under development to its users. The extensions, named "ahban.shiba" and "ahban.cychelloworld," have since been taken down by the marketplace maintainers. Both the extensions, per ReversingLabs, incorporate code that's designed to invoke a
Avatar
Read More