House security large ADT has confirmed a data breach after the ShinyHunters extortion group threatened to leak stolen information until a ransom is paid.
In a press release shared in the present day, the corporate mentioned it detected unauthorized entry to buyer and potential buyer information on April 20, after which it terminated the intrusion and launched an investigation.
This investigation decided that non-public info was stolen through the breach.
“The investigation confirmed that the knowledge concerned was restricted to names, cellphone numbers, and addresses,” ADT advised BleepingComputer.
“In a small proportion of instances, dates of delivery and the final 4 digits of Social Safety numbers or Tax IDs have been included. Critically, no cost info — together with financial institution accounts or bank cards — was accessed, and buyer security techniques weren’t affected or compromised in any approach.”
ADT says the intrusion was restricted and that it has contacted all affected people.
ShinyHunters leak website itemizing
This assertion follows ADT’s itemizing on the ShinyHunters information leak website, the place attackers claimed to have stolen 10 million information containing prospects’ private info.
“Over 10M information containing PII and different inner company information have been compromised. Pay or Leak,” reads the information leak website.
“It is a closing warning to achieve out by 27 Apr 2026 earlier than we leak together with a number of annoying (digital) issues that’ll come your approach.”

ADT didn’t affirm the amount of information theft claimed by the attackers.
ShinyHunters advised BleepingComputer they allegedly breached ADT by means of a voice phishing (vishing) assault that compromised an worker’s Okta single sign-on (SSO) account. Utilizing this account, the risk actors claimed they accessed and stole information from the corporate’s Salesforce occasion.
Since final 12 months, the extortion group has been conducting widespread vishing campaigns that concentrate on workers and BPO brokers’ Microsoft Entra, Okta, and Google SSO accounts.
After having access to a company SSO account, the risk actors steal information from linked SaaS purposes akin to Salesforce, Microsoft 365, Google Workspace, SAP, Slack, Adobe, Atlassian, Zendesk, Dropbox, and plenty of others.
This stolen information is then used to extort the corporate into paying a ransom, or the information can be leaked.
ADT has beforehand disclosed data breaches in August and October 2024 that uncovered buyer and worker info.
AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of latest exploits is coming.
On the Autonomous Validation Summit (Could 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.
Declare Your Spot



