Questions? Call us today: (516) 778-5639

authID Home
authID Home

Data Breach Insights

The Breach of 70 Million AT&T Accounts via Snowflake

  • Caused by Account Takeover Single Factor Authentication
  • Enabled by Third Party Platform Snowflake
  • Biometric Authentication Would Have Helped Prevent It

 

 

Home » Major Security Breaches » Additional Security Breaches Due to Account Takeover

What Happened

Earlier in 2024, more than 70 million AT&T customers’ data was leaked to the Dark Web, including a large amount of PII such as physical addresses, DoBs, and Social Security numbers. Now a new breach, which occurred over five months in 2022, has been announced. Approximately 109 million AT&T cellular customers, as well as users of AT&T’s mobile wireless network (MVNO) were affected. Included in the breach were landline customers whose numbers interacted with those cellular accounts.

While no PII is known to have been stolen in this latest attack, the data that was affected (which includes call and text records) could enable bad actors to triangulate users’ physical locations, compromise the privacy of journalistic sources and people trying to escape abusive relationships, and expose victims to social engineering and other attacks.

Leaked account credentials from Snowflake, a third party platform used by AT&T, appear to be the attack conduit. A Snowflake breach had previously enabled hundreds of other breaches against large companies such as Santander, Neiman Marcus, Ticketmaster, and others.

How It Happened

One suspect has been arrested for the breach, after having accessed and copied AT&T call and text logs for nearly all of AT&T’s wireless and MVNO customers and operators. The attack was enabled through a breach of the third party Snowflake, whose user accounts were protected only by single-factor authentication, the credentials for which had been previously stolen through other breaches.

Learn more: AT&T Data Breach: What’s next for affected customers?

How authID Would Have Prevented This

Had AT&T’s Snowflake account been enrolled with the account owner’s facial biometrics using authID’s robust biometric authentication solution for login access, the attacker would have been stopped when required the attacker to authenticate using their face to access the Snowflake account containing AT&T’s data. authID’s authentication would be unaffected by smishing attacks, SIM swap attacks, or device malware attacks, which can compromise traditional MFA solutions. This is because authID’s biometric authentication is not tied to any device or phone number but is directly bound to AT&T’s Snowflake account. If the attacker attempted to use a digital facial image of an AT&T Snowflake account owner by presenting it to a camera or injecting it through software, hardware, or network methods, it would be identified as a presentation or injection attack, resulting in blocked access.

Some of the Top Financial, Medical and Hospitality Brands Trust authID

Beem Logo from authID
Hamilton Reserve Bank Logo from authID
ABM Logo from authID
ABR American Board of Radiology Logo from authID
PickleJar Logo from authID
Syntrove Logo from authID
Intellicheck Logo from authID
Kompliant Logo from authID
KaiaSoft Logo from authID
IDMWORKS Logo from authID
EinStrong Foundation Logo from authID
ShotPro Logo from authID
authID Free Trial Image

According to IBM Cost of a Data Breach Report - 2023

The average data breach in the US last year cost business $4.4M. Biometric verification would have helped stop it.

Set up a free 30-day trial today to help prevent a data breach!

We will contact you within 24 hours to set up your demo.
authID Free Trial Image

According to IBM Cost of a Data Breach Report - 2023