Security & Infrastructure Tools
ADT confirms data breach after ShinyHunters leak threat
ADT confirms a data breach after a ShinyHunters extortion threat, detecting unauthorized access on April 20, 2026 and concluding personal data was stolen. The exposed information includes names, phone numbers, and addresses, with a small percentage containing dates of birth and the last four digits of Social Security numbers or Tax IDs; payment data was not accessed and customer security systems were not affected. ShinyHunters claimed as many as 10 million records were stolen and threatened to leak the data unless a ransom is paid. The attackers allegedly used a vishing campaign to compromise an employee’s Okta SSO and accessed Salesforce data. ADT says it has contacted all affected individuals.

ADT Confirms Data Breach After ShinyHunters Threat
- Incident Overview
- ADT, a major home security provider, confirmed unauthorized access to customer and prospective customer data.
- The breach was detected on April 20, 2026, after which the intrusion was terminated and an internal investigation was launched.
- The company stated that personal information was stolen during the incident, though certain details remained limited in scope.
- Data Involved
- The information affected is reported to be limited to names, phone numbers, and addresses.
- In a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included.
- Critically, no payment information (bank accounts or credit cards) was accessed, and customer security systems were not affected or compromised.
- ADT indicated that the intrusion was limited in scope and that affected individuals have been contacted.
- Attacker Claims and Public Listing
- The attackers, ShinyHunters, listed ADT on their data leak site, claiming that they had stolen more than 10 million records containing customers’ personal information.
- The data leak site message threatened to leak the data unless a ransom was paid.
- The listing warned of impending leakage and referenced a deadline of April 27, 2026, for ransom payment, framing it as a final warning.
- Attack Vector and Access Method
- ShinyHunters has claimed the breach occurred through a voice phishing (vishing) campaign that compromised an employee’s Okta single sign-on (SSO) account.
- With access to the Okta SSO, attackers allegedly accessed the company’s Salesforce instance and exfiltrated data from connected SaaS applications.
- Accessed Systems and Data Pathways
- After gaining control of an SSO account, attackers are said to have navigated multiple connected SaaS services to reach data stores.
- Reported applications implicated by the attackers include Salesforce, Microsoft 365, Google Workspace, SAP, Slack, Adobe, Atlassian, Zendesk, Dropbox, and other commonly used enterprise services.
- This pattern aligns with the broader extortion campaigns attributed to ShinyHunters, which leverage compromised SSO credentials to move laterally across cloud apps.
- ADT’s Response and Current Status
- ADT states that the intrusion was contained and that the company has contacted all affected individuals.
- The investigation is ongoing to determine the full extent of the breach and to assess any potential downstream effects.
- The company emphasized that no payment data was accessed and that customer security systems were not impacted.
- Historical Context and Related Incidents
- ADT has experienced prior data incidents, with disclosures in August 2024 and October 2024 related to breaches involving customer and employee information.
- These earlier incidents are part of a broader pattern in which compromised credentials and cloud-service access are used to exfiltrate data from enterprise systems.
- The ShinyHunters campaigns have targeted organizations through repeated attempts to phish employee accounts and access corporate SSO platforms.
- The ShinyHunters Threat Model and Implications
- The threat group’s tactic—breach via stolen SSO credentials followed by data exfiltration from connected apps—highlights the risk posed by compromised identity management in modern enterprises.
- The claimed volume (over 10 million records) and the nature of the data involved (PII and partial identifiers) underscore the potential privacy and regulatory implications for affected individuals.
- The public leakage threat and ransom demand are characteristic of ShinyHunters’ extortion strategy, which aims to pressure organizations into paying to prevent disclosure.
- Timeline and Key Dates
- April 20, 2026: ADT detects unauthorized access and initiates containment and investigation.
- April 27, 2026: attackers’ stated deadline to reach out and avert leakage (as per the ShinyHunters listing and threat language).
- April 24, 2026: the reporting date used in the public narrative surrounding the incident and the threat timeline.
- Ongoing: investigation and communications with affected individuals continue as the scope is clarified.
- Scope of Knowledge and Unknowns
- The exact volume of data stolen remains unconfirmed by ADT; the ShinyHunters listing claims “over 10M records,” but the company has not publicly verified this figure.
- It is unclear whether any additional data beyond the initially identified fields was accessed or exfiltrated.
- The full impact on downstream systems and any potential regulatory notifications are still being determined as the incident unfolds.
- Summary of What Is Known
- ADT acknowledges unauthorized access and an ongoing investigation.
- Personal data such as names, phone numbers, and addresses were involved, with a minority of records including dates of birth and partial SSN/Tax IDs.
- No payment data was reported to be accessed, and critical security systems were not affected according to ADT.
- ShinyHunters has publicly claimed a much larger data breach footprint, but the claimed volume has not been independently confirmed by ADT at this time.
- The situation remains fluid as the investigation progresses and as the extortion timeline with the threat actors develops.