AT&T

AT&T

The Everest ransomware group claimed to have stolen **576,686 personal records** from **AT&T Careers**, the telecom giant’s official job and recruitment platform. The leaked data reportedly includes applicant and employee records, such as resumes, career-related information, and potentially sensitive personal details. The group posted the listing on its dark web leak site on **October 21**, with a **four-day countdown** before public release, restricting access behind a password. While AT&T has not confirmed the breach, the incident follows prior high-profile breaches, including a **2021 ShinyHunters attack** (70M customer records) and a **2025 leak** (86M decrypted SSNs). The Everest group, known for extorting corporations, has previously targeted companies like Coca-Cola and Mailchimp. The breach raises concerns over **employee data security**, potential **phishing risks**, and AT&T’s cybersecurity posture, especially if third-party vendors were involved. Affected individuals are advised to **reset passwords, enable MFA, and monitor financial/credit activity** for signs of misuse.

Source: https://hackread.com/everest-ransomware-att-careers-breach/

TPRM report: https://www.rankiteo.com/company/att

"id": "att2192021102425",
"linkid": "att",
"type": "Ransomware",
"date": "6/2021",
"severity": "85",
"impact": "3",
"explanation": "Attack with significant impact with internal employee data leaks"
{'affected_entities': [{'customers_affected': '576,686 (potential '
                                              'applicants/employees)',
                        'industry': 'telecommunications',
                        'location': 'United States',
                        'name': 'AT&T',
                        'size': 'large (global enterprise)',
                        'type': 'corporation'}],
 'customer_advisories': ['Applicants/employees advised to change passwords, '
                         'enable MFA, and monitor for fraud.',
                         'Official guidance from AT&T pending.'],
 'data_breach': {'data_exfiltration': 'Claimed by Everest ransomware group',
                 'number_of_records_exposed': '576,686',
                 'personally_identifiable_information': 'Likely (e.g., names, '
                                                        'contact details, '
                                                        'resumes, possibly '
                                                        'SSNs)',
                 'sensitivity_of_data': 'High (potentially includes resumes, '
                                        'PII, career-related documents)',
                 'type_of_data_compromised': ['personal records',
                                              'recruitment data',
                                              'applicant/employee '
                                              'information']},
 'date_detected': '2025-10-21',
 'date_publicly_disclosed': '2025-10-21',
 'description': 'The Everest ransomware group claims to hold 576,686 personal '
                'records linked to AT&T Careers, the telecom giant’s official '
                'job and recruitment platform. The listing appeared on October '
                "21, 2025, on the group's dark web leak site, with a "
                'password-protected entry and a four-day countdown before '
                'public release. The data may include recruitment, applicant, '
                'or employee records. AT&T has not yet publicly confirmed or '
                'denied the breach.',
 'impact': {'brand_reputation_impact': 'Potential reputational damage due to '
                                       'repeated breaches and lack of '
                                       'immediate public response',
            'data_compromised': ['personal records (576,686)',
                                 'potential recruitment/applicant/employee '
                                 'data'],
            'identity_theft_risk': 'High (if records include PII like resumes, '
                                   'contact details, or SSNs)',
            'systems_affected': ['AT&T Careers platform (job and recruitment '
                                 'portal)']},
 'initial_access_broker': {'data_sold_on_dark_web': 'Claimed '
                                                    '(password-protected '
                                                    'listing with 4-day '
                                                    'countdown)',
                           'high_value_targets': ['AT&T Careers platform '
                                                  '(recruitment/applicant '
                                                  'data)']},
 'investigation_status': 'Unverified by AT&T; under monitoring by Hackread.com',
 'motivation': ['financial extortion', 'data theft'],
 'ransomware': {'data_exfiltration': 'Claimed (576,686 records)',
                'ransomware_strain': 'Everest'},
 'recommendations': ['Change AT&T account passwords and avoid reuse elsewhere.',
                     'Enable multi-factor authentication (MFA) on all '
                     'accounts.',
                     'Monitor financial statements, credit files, and '
                     'communications for suspicious activity.',
                     "Beware of phishing attempts referencing 'AT&T Careers' "
                     "or 'application portal'.",
                     'Follow official AT&T channels for notifications, not '
                     'unsolicited links.',
                     'AT&T should investigate third-party vendor risks as a '
                     'potential breach source.'],
 'references': [{'date_accessed': '2025-10-21',
                 'source': 'Hackread.com',
                 'url': 'https://www.hackread.com'},
                {'date_accessed': '2025-10-21',
                 'source': 'Everest ransomware group dark web leak site'}],
 'threat_actor': 'Everest ransomware group',
 'title': 'AT&T Careers Data Leak by Everest Ransomware Group',
 'type': ['data breach', 'ransomware extortion']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.