HOME     MENU     SEARCH     NEWSLETTER    
CUSTOMER RELATIONSHIP MANAGEMENT NEWS. UPDATED 11 MINUTES AGO.
You are here: Home / Mobile Industry News / AT&T Blames Data Breach on Vendor
Vendor To Blame for AT&T Data Breach
Vendor To Blame for AT&T Data Breach
By Jennifer LeClaire / CRM Daily Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
JUNE
17
2014
AT&T has confirmed a data breach but there are yet many unknown details. The telecom giant said it recently learned that three employees of one of its vendors accessed some of its customer accounts without proper authorization. AT&T did not disclose the number of accounts or what information was breached.

"This is completely counter to the way we require our vendors to conduct business," AT&T said in a published statement. "We know our customers count on us and those who support our business to act with integrity and trust, and we take that very seriously. We have taken steps to help prevent this from happening again, notified affected customers, and reported this matter to law enforcement."

An undisclosed number of call records and Social Security Numbers were accessed sometime between April 9 and April 21, AT&T confirmed. The accounts were accessed as "part of an effort to request codes from AT&T that are used to 'unlock' AT&T mobile phones in the secondary mobile phone market," the company said.

Customers can request that phones be unlocked once they have fulfilled their wireless contract. AT&T believes the aim of the breach was to spoof customer identities in order to unlock phones, which are worth more on the secondhand market.

Accounting for Shades of Gray

We caught up with Alberto Solino, a technical program manager at security software and services firm Core Security, to get his take on the breach. He told us this is another example of companies failing to understand the risks that come along with third-party access -- and facing a crisis that may have been prevented by proactively seeking out or understanding potential attack paths.

"You can't make assumptions when it comes to security," Solino said. "You have to find these attack paths and validate them before someone else does or your business and most critical assets will always be at risk."

Andy Rappaport, chief architect at Core Security, told us privileged partners are in a gray area between insiders and outsiders. Security enforcement, network access, identity- and access-management entitlements, and auditing must account for these shades of gray.

Rappaport said he understands that business efficiency thrives on efficient supply-chains and federated partnerships. Security and access control are necessary to allow speed, he said, just like cars ultimately need brakes in order to safely travel fast.

"A company's attack surface grows as an exponent of the reliance on partners, outsourcing and even Software-as-a-Service," Rappaport said. "They are relying on not only their security policy and enforcement, but also on their partner's. It stretches the trust boundaries beyond the enterprise." (continued...)

1  2  Next Page >

Tell Us What You Think
Comment:

Name:

Eric:
Posted: 2014-06-16 @ 12:16pm PT
My account was accessed by someone trying to buy phones on my account. They had all my info. What stopped the fraud from occurring was they could not pronounce my last name....red flag...lol...

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
UCS Invicta: Integrated Flash Why wait for the future? Unlock the potential of your applications and create new business opportunities today with UCS Invicta Series Solid State Systems. Take advantage of the power of flash technology. See how it can help accelerate IT, eliminate data center bottlenecks, and deliver the peak application performance and predictability your users demand. Click here to learn more.
MORE IN MOBILE INDUSTRY NEWS
Product Information and Resources for Technology You Can Use To Boost Your Business
© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.