All posts
Cybersecurity

ADT Data Breach Exposes 5.5 Million Customers' Personal Info

Huma Shazia27 April 2026 at 8:48 pm4 min read
ADT Data Breach Exposes 5.5 Million Customers' Personal Info

Key Takeaways

ADT Data Breach Exposes 5.5 Million Customers' Personal Info
Source: BleepingComputer
  • 5.5 million ADT customers had names, addresses, phone numbers, and partial SSNs exposed
  • ShinyHunters gained access through a voice phishing attack on an employee's Okta SSO account
  • No payment information or customer security systems were compromised

What Happened

The ShinyHunters extortion group stole personal information from 5.5 million people after breaching home security giant ADT earlier this month. Data breach notification service Have I Been Pwned confirmed the figure after analyzing the stolen data.

ADT detected the breach on April 20, 2026. The company told BleepingComputer that while the intrusion was limited, attackers accessed names, phone numbers, and addresses. A smaller subset of victims also had dates of birth and the last four digits of Social Security numbers or Tax IDs exposed.

5.5 million
Number of individuals whose personal data was exposed in ADT's April 2026 breach, according to Have I Been Pwned

ADT emphasized that no payment information was accessed. Bank accounts, credit cards, and customer security systems remained uncompromised.

How ShinyHunters Got In

The extortion group told BleepingComputer they compromised an ADT employee's Okta single sign-on account using voice phishing, also called vishing. The attackers called the employee and tricked them into handing over credentials or authentication codes.

Once inside the SSO account, ShinyHunters accessed ADT's Salesforce instance and extracted customer data. This attack method has become ShinyHunters' signature. The group runs widespread vishing campaigns targeting employees and business process outsourcing agents who use Microsoft Entra, Okta, and Google SSO.

After breaching corporate SSO accounts, they steal data from connected SaaS applications. Their targets include Salesforce, Microsoft 365, Google Workspace, SAP, Slack, Adobe, Atlassian, Zendesk, and Dropbox.

The Leaked Data

ShinyHunters initially claimed they had stolen over 10 million records containing personally identifiable information and ADT corporate data. When ADT refused to pay, the group leaked an 11GB archive on their dark web site.

ADT on ShinyHunters
ADT's stolen data listed on ShinyHunters' dark web leak site

Have I Been Pwned's analysis of the leaked data found it contained unique email addresses, names, dates of birth, phone numbers, physical addresses, and partial government-issued IDs for 5.5 million people. ADT has not publicly confirmed this number.

ADT's Breach History

This is ADT's third disclosed data breach in less than a year. The company reported breaches in August 2024 and October 2024 that exposed employee and customer information.

ADT was founded in 1874 as American District Telegraph, making it the oldest home security company in the United States. It's also the largest, providing monitored security and smart home solutions to over 6 million residential and small-business customers.

ShinyHunters' Recent Activity

ADT is not the only major company ShinyHunters has hit recently. Last week, the group also claimed to have stolen more than 9 million records from Medtronic, the world's largest medical device maker by revenue.

Also Read
Medtronic Confirms Data Breach After ShinyHunters Claims 9M Records

ShinyHunters' parallel attack on another major company

The group's vishing campaigns targeting corporate SSO accounts began last year and have proven effective against companies that rely on cloud-based identity management. The pattern is consistent: compromise one employee's SSO credentials, then pivot to connected SaaS applications where customer data lives.

What ADT Customers Should Do

  • Watch for phishing attempts using your name, address, or phone number
  • Be suspicious of calls claiming to be from ADT or related services
  • Monitor credit reports if your partial SSN was exposed
  • Consider a credit freeze if concerned about identity theft

ADT has not announced whether it will provide credit monitoring services to affected customers. The company has also not disclosed when or how it will notify the 5.5 million people whose data was exposed.

ℹ️

Logicity's Take

Frequently Asked Questions

Was my ADT account password stolen?

ADT has not reported any credential theft. The stolen data included names, addresses, phone numbers, and in some cases partial SSNs, but not login credentials or passwords.

Is my home security system still secure?

Yes. ADT confirmed that customer security systems were not affected or compromised. The breach was limited to customer personal information stored in corporate systems.

Was my credit card information stolen?

No. ADT stated that no payment information, including bank accounts or credit cards, was accessed in this breach.

How do I know if my data was in this breach?

You can check Have I Been Pwned (haveibeenpwned.com) using your email address. The service analyzed the leaked data and can tell you if your information was included.

What is voice phishing (vishing)?

Vishing is a social engineering attack where criminals call employees and trick them into revealing login credentials or authentication codes. ShinyHunters used this method to compromise an ADT employee's Okta account.

ℹ️

Need Help Implementing This?

Source: BleepingComputer

H

Huma Shazia

Senior AI & Tech Writer

Related Articles