AT&T to pay compensation to data breach victims. Here’s how to check if you were affected – Malwarebytes
Activate subscription >
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account?
Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
AT&T is set to pay $177 million to customers affected by two significant data breaches. These breaches exposed sensitive personal information of millions of current and former AT&T customers.
For those that have missed the story so far:
Following these incidents, AT&T faced multiple class action lawsuits alleging inadequate protection of customer data. Now, a US District Judge has granted preliminary approval to a settlement resolving these lawsuits. This settlement offers an opportunity for affected customers to receive compensation for the harm caused by these breaches.
The projected timeline for the claims process looks like this
To find out how to claim, watch for official notifications from AT&T or check the settlement website once it launches.
You can use Malwarebytes’ easy, free tool—the Malwarebytes Digital Footprint Portal—to check if your data was exposed in the AT&T breach. Simply click the button below, enter your email address, and follow the prompts on the screen.
SCAN NOW
When you get your results, you’ll see a pink bubble with the words “Exposed on AT&T” if your information was affected in the breach. If you see a green bubble then your data was not exposed.
We will keep you posted of any new developments in this case. Stay tuned!
We don’t just report on threats—we help safeguard your entire digital identity
Cybersecurity risks should never spread beyond a headline. Protect your, and your family’s, personal information by using identity protection.
SHARE THIS ARTICLE
Pieter Arntz
Malware Intelligence Researcher
Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.
Seven years after the original attack, CISA has added the ASUS Live Update backdoor to its Known Exploited Vulnerabilities catalog.
Criminals are tricking WhatsApp users into linking an attacker’s browser to their account using fake login pages and routine-looking prompts.
Google's patched two flaws in Chrome, both of which can be triggered remotely when a user loads specially crafted web content.
CISA warns ASUS Live Update backdoor is still exploitable, seven years on
The ghosts of WhatsApp: How GhostPairing hijacks accounts
Chrome extension slurps up AI chats after users installed it for privacy
Contributors
Threat Center
Podcast
Glossary
Scams
Malwarebytes – all-in-one cybersecurity protection always by your side.
COMPUTER SECURITY
MOBILE SECURITY
PRIVACY PROTECTION
IDENTITY PROTECTION
LEARN ABOUT CYBERSECURITY
PARTNER WITH MALWAREBYTES
ADDRESS
One Albert Quay
2nd Floor
Cork T12 X8N6
Ireland
2445 Augustine Drive
Suite 550
Santa Clara, CA
USA, 95054
ABOUT MALWAREBYTES
WHY US
GET HELP
Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.
© 2025 All Rights Reserved
source
This article was autogenerated from a news feed from CDO TIMES selected high quality news and research sources. There was no editorial review conducted beyond that by CDO TIMES staff. Need help with any of the topics in our articles? Schedule your free CDO TIMES Tech Navigator call today to stay ahead of the curve and gain insider advantages to propel your business!
Add devices or upgrade >
Renew subscription >
Secure Hub >
Don’t have an account?
Sign up >
< Products
Have a current computer infection?
Worried it’s a scam?
Try our antivirus with a free, full-featured 14-day trial
Get your free digital security toolkit
Find the right cyberprotection for you
< Business
< Pricing
Protect your personal devices and data
Protect your team’s devices and data – no IT skills needed
Explore award-winning endpoint security for your business
< Resources
< Support
Malwarebytes and Teams Customers
Nebula and Oneview Customers
AT&T is set to pay $177 million to customers affected by two significant data breaches. These breaches exposed sensitive personal information of millions of current and former AT&T customers.
For those that have missed the story so far:
Following these incidents, AT&T faced multiple class action lawsuits alleging inadequate protection of customer data. Now, a US District Judge has granted preliminary approval to a settlement resolving these lawsuits. This settlement offers an opportunity for affected customers to receive compensation for the harm caused by these breaches.
The projected timeline for the claims process looks like this
To find out how to claim, watch for official notifications from AT&T or check the settlement website once it launches.
You can use Malwarebytes’ easy, free tool—the Malwarebytes Digital Footprint Portal—to check if your data was exposed in the AT&T breach. Simply click the button below, enter your email address, and follow the prompts on the screen.
SCAN NOW
When you get your results, you’ll see a pink bubble with the words “Exposed on AT&T” if your information was affected in the breach. If you see a green bubble then your data was not exposed.
We will keep you posted of any new developments in this case. Stay tuned!
We don’t just report on threats—we help safeguard your entire digital identity
Cybersecurity risks should never spread beyond a headline. Protect your, and your family’s, personal information by using identity protection.
SHARE THIS ARTICLE
Pieter Arntz
Malware Intelligence Researcher
Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.
Seven years after the original attack, CISA has added the ASUS Live Update backdoor to its Known Exploited Vulnerabilities catalog.
Criminals are tricking WhatsApp users into linking an attacker’s browser to their account using fake login pages and routine-looking prompts.
Google's patched two flaws in Chrome, both of which can be triggered remotely when a user loads specially crafted web content.
CISA warns ASUS Live Update backdoor is still exploitable, seven years on
The ghosts of WhatsApp: How GhostPairing hijacks accounts
Chrome extension slurps up AI chats after users installed it for privacy
Contributors
Threat Center
Podcast
Glossary
Scams
Malwarebytes – all-in-one cybersecurity protection always by your side.
COMPUTER SECURITY
MOBILE SECURITY
PRIVACY PROTECTION
IDENTITY PROTECTION
LEARN ABOUT CYBERSECURITY
PARTNER WITH MALWAREBYTES
ADDRESS
One Albert Quay
2nd Floor
Cork T12 X8N6
Ireland
2445 Augustine Drive
Suite 550
Santa Clara, CA
USA, 95054
ABOUT MALWAREBYTES
WHY US
GET HELP
Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.
© 2025 All Rights Reserved
source
This article was autogenerated from a news feed from CDO TIMES selected high quality news and research sources. There was no editorial review conducted beyond that by CDO TIMES staff. Need help with any of the topics in our articles? Schedule your free CDO TIMES Tech Navigator call today to stay ahead of the curve and gain insider advantages to propel your business!

