Claims of up to 10 million records
ADT Inc., a leading home security provider, has confirmed a significant data breach following a threat from the ShinyHunters extortion group. The threat actors claim to have exfiltrated 10 million customer records and have threatened to leak the data. The initial attack vector was a voice phishing (vishing) campaign that successfully compromised an employee's Okta single sign-on (SSO) credentials. This allowed the attackers to gain unauthorized access to the company's Salesforce instance, from which customer and prospective customer data was stolen. ADT has stated that the breach was limited in scope, affecting personally identifiable information (PII) but not sensitive financial details or security system integrity. The company has engaged cybersecurity experts, notified law enforcement, and is providing identity protection services to affected individuals.
On April 20, 2026, ADT detected unauthorized access to its cloud environment. The incident was publicly disclosed after ShinyHunters, a well-known data extortion group, listed ADT on its dark web leak site. The group set a deadline of April 27, 2026, for ADT to make contact before they would release the stolen data, which they claim includes 10 million records.
The attack chain began with a social engineering tactic known as vishing. The attackers successfully manipulated an ADT employee over the phone to gain their Okta SSO credentials. With this authenticated access, ShinyHunters infiltrated ADT's Salesforce environment, a critical repository for customer relationship management. From there, they exfiltrated data containing customer PII. This TTP is a hallmark of ShinyHunters, which has a history of leveraging compromised SSO accounts to breach major corporations.
ADT's 8-K filing with the U.S. Securities and Exchange Commission confirmed the breach but did not validate the 10 million record figure. The company specified that the exposed data includes names, phone numbers, and addresses, with a smaller subset also including dates of birth and the last four digits of Social Security or Tax IDs.
The attack on ADT demonstrates a classic, multi-stage intrusion leveraging social engineering and abuse of legitimate cloud services. The threat actor's Tactics, Techniques, and Procedures (TTPs) can be mapped to the MITRE ATT&CK framework:
T1566.004 - Spearphishing Voice, commonly known as vishing. This social engineering technique bypassed technical controls by targeting the human element, tricking an employee into divulging their credentials.T1078.004 - Cloud Accounts. By using valid credentials for the Okta SSO platform, their initial activity appeared legitimate, helping them evade immediate detection.T1530 - Data from Cloud Storage Object by querying and collecting sensitive customer information stored within the CRM platform.T1048 - Exfiltration Over Alternative Protocol.This incident highlights the critical vulnerability of SSO platforms when not protected by phishing-resistant Multi-Factor Authentication (MFA). A single credential compromise can provide broad access to multiple federated applications.
The business impact of this breach is multifaceted. For a company whose brand is built on security and trust, the reputational damage is significant. The public disclosure that an employee of a security company fell for a vishing attack can erode customer confidence. Operationally, ADT faces substantial costs related to the incident response, investigation, legal fees, and the provision of complimentary identity protection services for affected individuals. The exfiltrated PII, especially the combination of names, addresses, and partial SSNs, puts affected customers at a heightened risk of targeted phishing campaigns, identity theft, and other forms of fraud. While ADT has confirmed that physical security systems were not compromised, the breach of customer data still represents a severe security failure.
No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.
Security teams may want to hunt for activity related to the TTPs used in this attack. The following patterns could indicate related activity:
Okta System LogSalesforce Event MonitoringReportExport events indicating unusually large data exports, especially by users who do not typically perform such actions. Correlate with logins from unfamiliar IP ranges or locations.Anomalous API Usagequery or queryAll calls from a single user session, which could indicate mass data scraping.Impossible TravelDetecting this type of attack requires a defense-in-depth approach focused on identity and cloud application security.
D3-UGLPA: User Geolocation Logon Pattern Analysis.D3-RAPA: Resource Access Pattern Analysis.Upon detection of a compromised SSO account, the immediate response should be to terminate all active sessions for the user, reset their password, and force re-enrollment of MFA to evict the attacker.
Organizations can take several steps to mitigate the risk of similar attacks:
D3-MFA: Multi-factor Authentication.Implementing phishing-resistant MFA (e.g., FIDO2) would have prevented the compromised credentials from being successfully used.
Mapped D3FEND Techniques:
Training employees to recognize and report social engineering attempts like vishing is a critical non-technical control.
Enforcing the principle of least privilege for cloud accounts limits the potential damage if an account is compromised.
To specifically counter the vishing vector used against ADT, organizations must prioritize the deployment of phishing-resistant MFA, such as FIDO2/WebAuthn security keys. Unlike one-time passwords or push notifications, which can be phished, FIDO2 binds authentication to a specific hardware device and origin, making it nearly impossible for an attacker to capture and replay credentials. This should be mandated for all employees, especially those with access to sensitive systems like Salesforce or administrative portals like Okta. The implementation should focus on high-risk applications first and be coupled with user training on the new authentication method. This directly hardens the initial access and credential access stages of the attack chain, rendering the stolen password useless without the physical token.
In the context of the ADT breach, Resource Access Pattern Analysis should be applied to the Salesforce environment. Security teams must establish a baseline of normal data access and export behavior for different user roles. By ingesting Salesforce Event Monitoring logs into a SIEM or UEBA platform, it's possible to create rules that alert on deviations from this baseline. For example, an alert should trigger if a user account that has never exported more than 100 records in a day suddenly exports 10,000. Further context, such as the user's source IP, time of day, and recent authentication history from Okta, can enrich these alerts. This technique provides a critical detection layer inside the perimeter, capable of spotting an attacker's collection and exfiltration activities even after they have successfully authenticated.
ADT detected unauthorized access to its cloud-based environments.
ADT filed a Form 8-K with the U.S. Securities and Exchange Commission disclosing the breach.
Deadline set by ShinyHunters for ADT to make contact before leaking the stolen data.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats