Let's breakdown how the AT&T breach will impact us at home and at work and what we can do to protect ourselves.

The AT&T breach includes numbers called and texted, the number of call and text interactions, the call length, and some people had cell site identification numbers leaked (which leaks the approximate location of person at the time that the call or text was placed).

How does this breach increase risk for us at home and at work?

1. Social Engineering Risk
The believability of social engineering attacks will increase for those affected because attackers know which phone numbers to spoof to you.
Attackers can pretend to be a boss, friend, cousin, nephew etc and say they need money, password, access, or data with a higher degree of confidence that their impersonation will be believable.

2. Threaten, Extort, & Harm Risk
This stolen data can reveal where someone lives, works, spends their free time, who they communicate with in secret including affairs, any crime based communication, or typical private/sensitive conversations that require secrecy. This is a big deal for anyone affected.

For celebrities and politicians, this information getting leaked greatly affects their privacy, physical safety, sensitive work, potentially even national security because the criminals have a record of who is in contact with whom, when and sometimes where.
The criminals could extort those people who are trying to keep that information (rightly) private, they could threaten their physical safety at the locations revealed in the metadata, they could pretend to be the people they called and texted often and ask for money, sensitive details, and increase the likelihood of successfully tricking that victim.

For those experiencing abuse or harassment, the impact of this breach is terrifying for their physical security and beyond as they need to keep their communications private to those that can help them get out of their abusive situation.

3. Increased Believable Phishing Attacks via Call, Email, Text, and Social Media Risk

If a criminal knows your phone number has regularly called a phone number belonging to a specific Bank, Doctor's Office, Government Office, etc then they know exactly who to pretend to be when contacting you and attempting to trick you.

For example, the criminal could pretend to be the bank that you interact with, spoof the bank phone number with an app from the app store, and say there is a problem with your account and suggest money is transferred to "protect the account" (a common scam), or could "help change a password" (another common scam) to gain access to the account and drain the funds.

In short, if a criminal knows WHO you interact with -- then they know WHO TO PRETEND TO BE to be when they try to trick you in a phishing phone call, email, text message, or social media direct message.

When criminals impersonate people or organizations that are trusted by their victim, the criminal is more successful in their attack.

4. Link Sensitive Political, Business, and Interpersonal Interactions Risk

When a criminal has a list of which phone numbers interact with whom, they are able to link sensitive interactions, communications, deals, crime, etc together.

This will impact those in national security, defense, policy, government officials, celebrities, politicians, everyone whose privacy is affected here.

Because phone numbers are linked to people's names and jobs via data brokerage sites, data breaches, LinkedIn, etc it's easy for criminals to start to associate phone numbers in the breach to people those victims have communicated with.

This of course creates risk for anyone in sensitive communication with other government officials, can leak sensitive business deal communications and timing, leak someone's potential involvement in a sensitive situation, etc.

*So, what can I do to keep myself, my family, and my organization safe and secure in the wake of this massive breach?*

- Be Politely Paranoid: recognize that your contacts and phone/text message interactions could be publicly available and increase the risk of social engineering, phishing, etc. Use 2 methods of communication to confirm people are who they say they are before sending money, sharing sensitive data, etc.

- Stop Reusing Passwords: if criminals know who we trust then they are able to pretend to be those people or companies to us, increasing phishing believability (when the criminal knows which bank we use, their phish is more relevant). Using a long, random, and unique password for each account helps ensure that you protect your accounts, even if one gets hacked/tricked out of you due to this breach.
Additionally, criminals can look up which companies we contact and trust from this breach then look up our phone number in other data breaches to gather passwords breached previously then use those stolen & reused passwords against current accounts to steal data/money without ever needing to phish folks in the first place.

- Turn on MFA (Multi-Factor Authentication): communications and companies we trust are less private now because of this breach so we need to protect our accounts with a second factor when logging in even more. This ensures the criminals can't just find or phish passwords then gain access to take over the account immediately -- I recommend app based MFA at the very least for many high threat model folks. If your family has lower comfortability for added technology, SMS 2FA is much better than nothing. If your threat model is extra high (in the public eye, etc): move toward a FIDO solution like YubiKey, etc.

- Use Encrypted Communications: encrypted communication help us avoid this specific type of data leakage in the future. There are many encrypted communication options including Signal, etc. Choose the one that is right for you.

Thank you @lorenzofb @techcrunch for chatting with me about how this breach impacts risk for everyday folks, celebrities, politicians, and more: https://techcrunch.com/2024/07/12/what-the-att-call-records-data-breach-means-for-you/

What the AT&T phone records data breach means for you | TechCrunch

The giant U.S. telco lost the information of around 110 million customers. Here’s what you need to know.

TechCrunch
@racheltobac @lorenzofb @techcrunch An important point (that I believe you and others have already made, but worth amplifying) is that this breach also exposes people who AREN'T AT&T customers. The data reveals a more complete social graph for AT&T users, but still reveals quite a bit about non-AT&T users who have contact with AT&T users. Since AT&T is one of the dominant carriers, just about EVERYONE in the US who uses SMS or voice telephony is likely represented to some degree in this dataset.
@mattblaze @racheltobac @lorenzofb @techcrunch I wonder if this also includes people roaming on AT&T's network during the affected time period. I use Rogers Wireless and when I am at Hacker Summer Camp my phone will camp out on AT&T's nearly unusable network for the week as their "preferred roaming partner"
@chetwisniewski @mattblaze @racheltobac @lorenzofb @techcrunch I would assume at least your number was present, and if someone wanted to search the data for it, who you connected to and your locations could be derived. The speculation that the data was in that cloud for FBI searching suggests an active investigation, or several, were underway, and that the exposed data necessarily includes such information, as that's the sort of data they ask for access to.
@mattblaze @racheltobac @lorenzofb @techcrunch freeze or lock your credit score accounts (experian, transunion, equifax) check you bank accounts and credit card accounts daily

@racheltobac @lorenzofb @techcrunch

"It's just metadata" right?

Well, the numbers of everyone (AT&T subscribers or not) who called or got calls or texts from any

- abortion clinic
- crisis line
- anonymous tip line
- investigative reporter,
- or any other org for which you might not want your association broadcast

that happens to get its telephone service from AT&T, is likely in this dataset.

Sleep well.

@racheltobac @lorenzofb @techcrunch

Here's a quick thing I wrote about 10 years ago about telecom metadata. The concerns from back then are even more acute today, with better analytical tools and a richer set of other data that can be linked to it.

https://www.wired.com/2013/06/phew-it-was-just-metadata-not-think-again/

Phew, NSA Is Just Collecting Metadata. (You Should Still Worry)

At least 'nobody is listening to our telephone calls'; many people breathed a sigh of relief since first learning of the surveillance because it’s just metadata, after all. Phew! Wrong. Metadata still leaves a lot to be concerned about. There’s more to privacy than just the sounds of our voices: Content may be what we say, but metadata is about what we actually do. And unlike our words, metadata doesn’t lie.

WIRED

@racheltobac @lorenzofb @techcrunch

And here's something from 2008. Metadata is often more powerfully revealing than content.

(Note references to the "Daytona" database)

https://www.mattblaze.org/blog/metatapping/

Matt Blaze: The Metadata is the Message

@mattblaze @racheltobac @lorenzofb @techcrunch ummm was daytona the db that got stolen?? If so were so deeply fucked lol
@mattblaze @racheltobac @lorenzofb @techcrunch Reminds me of Michael Hayden's "We kill people based on metadata"...

@mattblaze @racheltobac @lorenzofb @techcrunch i was just finishing my thesis on where i'd studied the metadata of years of qualcomm's internal email using just header info, back when everything was done with email. i was stunned at what i learned and tried to show how the business could use this goldmine of data. i could show the evolution of any chip we designed and who the players were, even including the non technical players, like execs, finance, and marketing.

at the same time the snowden report came out and my head exploded when people were parroting the "it's only metadata" line.

@lorenzofb @techcrunch @mattblaze @racheltobac And the NYTimes homepage says the breach did not include PII. Sheesh.

@racheltobac @lorenzofb I'm having a problem with the part about this being personal responsibility to secure my data, when its corps that collect and insecurely store it.

As I replied to @briankrebs
(It...) Seems like there needs to be a law requiring insurance on these data warehouses, wherein an insurer would not insure applicants whose data protection practices allowed intrusion & theft, much the same way that a waterfront warehouse of valuables would not be insurable if thieves repeatedly broke in and stole from them.

What are your thoughts on legislation requiring some kind of insurance like this?

@MHowell @racheltobac @lorenzofb @briankrebs
What kind of liability limits are you thinking, and to whom would the claim be paid?

@CassandraVert @racheltobac @lorenzofb @briankrebs That's a good question and I don't know the answer. Let me get back to you on that.

I'd speculate a claim could be paid, not to the insured, but to those whose data was insecurely stored, the customers.

Anyone have info to answer CassandraVert's questions?

@racheltobac I suspect that #2 will also severely impact journalists. There is significant interest in who journalists communicate with. In many cases their informants being discovered can be life-threatening.
@racheltobac @lorenzofb @techcrunch I'm curious about what kinds of services will also be exposed - for example does Twilio feed messaging through AT&T and show up? Duo? Okta? Can someone use this plus a few known user phone numbers to identify what services an enterprise is signed up for?

@fencepost @racheltobac @lorenzofb @techcrunch

I would not trust Twilio based upon history.

@SpaceLifeForm @racheltobac @lorenzofb @techcrunch I mentioned it only as a recognizable provider of SMS gateway services IIRC. Trusted or not I suspect a LOT of short code messages from SaaS providers move through their systems, and IF they go through AT&T after that it could be significant depending on the data in the breach.

@fencepost @racheltobac @lorenzofb @techcrunch

I was just thinking about the dots connecting SolarWinds and Okta. There are more.

Point here, is that the SMS goes thru insecure SS7.

ATT is the main MITM carrier of SS7 traffic.

https://www.csoonline.com/article/1249988/okta-confirms-recent-hack-affected-all-customers-within-the-affected-system.html

cc: Csoonline

Okta confirms recent hack affected all customers within the affected system

Contrary to its earlier analysis, Okta has confirmed that all of its customer support system users are affected by the recent security incident.

CSO Online
@racheltobac At this stage, they are saying that this information has not gone public. And that there has been an arrest. So. Fingers crossed.
“As of the date of this filing, AT&T does not believe that the data is publicly available,” the company told the SEC. https://www.csoonline.com/article/2516843/att-confirms-arrest-in-data-breach-of-more-than-110-million-customers.html
@lorenzofb @techcrunch
AT&T confirms arrest in data breach of more than 110 million customers

This is apparently the first cybersecurity incident where the Justice Department initially allowed an enterprise to not disclose

CSO Online
@racheltobac So ... any chance of using this data to find out how often Trump and Putin called each other?

@racheltobac @lorenzofb @techcrunch

And people wonder why I do not answer calls or respond to texts.

The only text I trust these dsys is if it is from someone that I think I know, *AND* if the text says that they tried to call, and that they want me to call them.

If I can see that they tried to call, that is a good sign.

It is sorta like a MFA.

In theory, I should be able to verify their voice, But you never know these days.

Some days, I wonder why I even have s phone.

@racheltobac @lorenzofb How do you think the breach might impact commercial users like vehicle over the air (OTA) updates, if at all?
@racheltobac @lorenzofb And thanks for the thoughtful reflection on the impact of the breach.
@racheltobac I'd say I'm glad I left AT&T, but now I'm on T-Mobile, which has a worse record.

@racheltobac

AT&T should be fined so heavily that all corporations will start taking security seriously, including deleting all data the second it is no longer essential to offer the service requested by their customers.

Executives should be held personally responsible.

Laws must be changed so that executives and shareholders can be held more responsible.

Enough of oligarchs making decisions with major effects on people's lives then escaping consequences because the corporation is "too big to fail" or small enough that it can just hide its assets and declare bankruptcy. 0

@lorenzofb

@racheltobac @lorenzofb @techcrunch

the biggest insult was that the "actual leak of 'people info' was not disclosed ( w/the Government's allowance) for
**so-called** National security reasons ?? till now!

@racheltobac @lorenzofb @techcrunch
I think that companies that are entrusted with our data should be required to have extensive systems, in place, to safeguard it. If those systems are lacking the fines should be enormous and criminal charges should be made as well. Now, it's cheaper to offer 1 yr of credit protection than installing robust anti-hacking systems.

@racheltobac @lorenzofb @techcrunch @stevetex

It's not just that USA data is breached, much of that data also includes data of people outside the USA without them realising it.