Multiple iHeartRadio stations breached in December

Avatar

Several radio stations owned by iHeartMedia were breached in December, exposing Social Security numbers, financial information and other personal details.

The media conglomerate filed breach notices in several states but declined to say how many people were impacted or how many stations were attacked when reached for comment.

“iHeartMedia + Entertainment, Inc. discovered and addressed an incident involving unusual activity on some systems at a small number of our local stations,” a spokesperson told Recorded Future News. “Upon detecting the activity, we took immediate steps to block it; triggered our incident response protocols; and launched an investigation with the assistance of a third-party cybersecurity firm. We also notified law enforcement.”

The breach letters sent to victims explain that hackers accessed the company’s systems between December 24 and December 27, viewing and obtaining files “on systems at a small number of local” iHeart stations.

The company conducted an investigation that ended on April 11, finding that the hacker’s accessed Social Security numbers, tax ID numbers, driver’s licenses, passport numbers, financial account numbers, health insurance information and payment card numbers. 

Victims are being given one year of identity protection services and a phone number was created to answer any questions those affected may have. 

The company reported the data breach to Maine, Massachusetts and California. It left blank the section of Maine’s form that asks how many total victims there are. No hackers ever took credit for the attack.

iHeart is the largest audio-focused company in the U.S., owning more than 870 stations and reaching a quarter of a billion listeners monthly. It reported a revenue of $3.8 billion last year.

Last week another large media conglomerate, Urban One, reported a data breach impacting the information of an unknown number of employees after a ransomware gang launched a cyberattack in February.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims

Next Post

Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

Related Posts

OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws

A second security flaw impacting the OttoKit (formerly SureTriggers) WordPress plugin has come under active exploitation in the wild. The vulnerability, tracked as CVE-2025-27007 (CVSS score: 9.8), is a privilege escalation bug impacting all versions of the plugin prior to and including version 1.0.82.  "This is due to the create_wp_connection() function missing a capability check and
Avatar
Read More

North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

The North Korea-linked threat actor known as Konni APT has been attributed to a phishing campaign targeting government entities in Ukraine, indicating the threat actor's targeting beyond Russia. Enterprise security firm Proofpoint said the end goal of the campaign is to collect intelligence on the "trajectory of the Russian invasion." "The group's interest in Ukraine follows historical targeting
Avatar
Read More