WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Posts CISA Alert – AT&T Discloses Breach of Customer Data
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Community Partners
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

CISA Alert – AT&T Discloses Breach of Customer Data

Author: Chase Snow

Created: Tuesday, July 16, 2024 - 17:23

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

CISA sent out an alert on Friday regarding AT&T’s recent disclosure of a data breach. AT&T reported unauthorized access of customer data in a third-party cloud platform. CISA encourages affected customers to review AT&T’s disclosure for additional information and guidance.

What Happened

AT&T customer data was stolen in a data breach from third-party cloud platform, Snowflake. The stolen data reportedly is not believed to contain sensitive information like call or text content, timestamps, Social Security numbers, or birthdates. However, the stolen data identified does include phone call and text message records of nearly all AT&T cellular customers during specific periods.

In a regulatory filing with the U.S. Securities and Exchange Commission on Friday, “AT&T believes that threat actors unlawfully accessed an AT&T workspace on a third-party cloud platform and, between April 14 and April 25, 2024, exfiltrated files containing AT&T records of customer call and text interactions that occurred between approximately May 1 and October 31, 2022, as well as on January 2, 2023.” The stolen data is also believed to include records of calls and texts for mobile providers that resell AT&T’s service such as Boost Mobile, Cricket Wireless, H2O, and Straight Talk Wireless.

AT&T has ensured that the initial access point used by attackers has been secured and is continuing to collaborate with law enforcement to address the situation. Affected customers will be notified while the company addresses ways to prevent further unauthorized access in the future. For more information, visit AT&T.

Related Resources

Tip of the Week – May 14, 2026

May 14, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 14, 2026)

May 14, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar