You know that sinking feeling when a company you trust – the one that literally secures your home – gets hacked? That's the reality for ADT customers this week.
The home security giant ADT confirmed a data breach affecting 5.5 million customers after the ShinyHunters extortion group leaked a massive cache of customer records. The attack didn't start with a sophisticated exploit or a zero‑day. It started with a voice phishing call – and an employee who picked up the phone.
This is the story of how a single conversation led to the compromise of Okta, then Salesforce, then millions of customer records. And it's a wake‑up call for every organization relying on SaaS identity providers.
The Breach at a Glance
The Attack Chain: From a Phone Call to Full Compromise
ShinyHunters didn't hack ADT's firewall or exploit a zero‑day in Salesforce. They called an employee.
🔵 Step 1: The Vishing Call
Sometime before April 2026, an ADT employee received a phone call. The caller claimed to be from IT support, perhaps from a trusted partner. Using social engineering, they convinced the employee to approve a multi‑factor authentication (MFA) push notification or to reveal a one‑time passcode. This is a classic “MFA fatigue” attack – bombarding the user with approval requests until they finally accept out of frustration or confusion.
With that approval, the attacker gained access to the employee's Okta single sign-on (SSO) account. They now had a legitimate, authenticated session inside ADT's identity management system.
🟠 Step 2: Okta as the Launchpad
Once inside Okta, the attackers could see which cloud applications the employee could access. They looked for high‑value targets – and found Salesforce. ADT uses Salesforce to manage customer accounts, support tickets, and marketing data. The compromised employee had permission to export customer records.
Using the stolen Okta session, the attackers simply logged into ADT's Salesforce instance as a legitimate user. No further hacking required.
🟡 Step 3: Data Exfiltration from Salesforce
Inside Salesforce, the attackers ran automated bulk export tools to extract customer data. According to ADT's SEC filing, the stolen data included:
- Customer names
- Phone numbers
- Physical addresses
- Email addresses (in some cases)
- Dates of birth (a small percentage)
- Last four digits of Social Security numbers (a small percentage)
The attackers then packaged the data – reportedly 11GB – and prepared to leak it if ADT didn't pay a ransom.
Why Traditional MFA Failed
ADT had multi‑factor authentication. It didn't stop the attack. Why?
Because not all MFA is equal. ADT was using push‑based MFA (e.g., “Approve” or “Deny” notifications). Attackers can defeat this through:
- MFA fatigue: Repeatedly sending push notifications until the user approves out of annoyance.
- Vishing: Calling the user and claiming to be IT, asking them to approve a test notification.
Phishing‑resistant MFA – such as FIDO2 security keys (YubiKeys) or certificate‑based authentication – would have blocked this attack entirely. The attacker cannot approve a hardware key prompt because they don't have the physical device.
As one security researcher noted: “The ADT breach is a textbook example of why you need to move beyond push MFA. Vishing turns a human into a proxy for the attacker.”
Monitor Okta logs for unusual application access patterns – especially an employee accessing Salesforce from a new device, at odd hours, or exporting large volumes of data. Enable Salesforce Event Monitoring to alert on bulk data exports (e.g., Data Export Service, Report Exports). The combination of a low‑privilege user suddenly performing high‑volume exports is a red flag.
What Data Was Actually Exposed? (And What Wasn't)
According to ADT's official SEC filing and customer notifications:
The most dangerous elements are the partial SSNs and dates of birth. Combined with names and addresses, attackers can attempt identity fraud, account takeover, and targeted phishing.
Uncertainty & Open Questions
While ADT has confirmed the breach, several details remain unclear:
- When exactly did the breach occur? ADT has not disclosed the date of the initial vishing attack.
- Was the compromised employee a contractor or full‑time employee? ShinyHunters has previously gained access via third‑party vendors.
- Why was a non‑admin employee able to export massive amounts of customer data? This suggests overly permissive Salesforce roles – a common misconfiguration.
- Has ADT implemented phishing‑resistant MFA (FIDO2) post‑breach? Not publicly disclosed.
ThreatAft will update this article as more information becomes available.
What You Should Do If You're an ADT Customer
ADT has notified affected customers. If you haven't received a notification but want to be proactive:
🔴 Immediate Steps
- Enable a credit freeze with all three major bureaus (Equifax, Experian, TransUnion). This prevents identity thieves from opening new accounts in your name. Given that partial SSNs and DOBs were exposed, this is the most important step.
- Monitor your credit reports for unauthorized inquiries or accounts. AnnualCreditReport.com offers free weekly reports through April 2027.
- Be hyper‑vigilant about phishing. Attackers now have your name, address, and phone number – they may impersonate ADT, your bank, or even the police.
- Change your ADT password if you use the ADT mobile app or web portal. Do not reuse passwords.
- Enable 2FA on your ADT account if available – but remember, it should be app‑based (TOTP) or hardware key, not SMS.
🟠 For Organizations (Lessons from ADT)
- Audit your Okta / SSO policies. Enforce phishing‑resistant MFA (FIDO2 / WebAuthn) for all employees, especially those with access to sensitive data stores like Salesforce. Move away from push notifications.
- Review Salesforce permissions. Use the principle of least privilege – can a sales rep really export 5 million records? Probably not. Restrict bulk export permissions to a small, monitored group.
- Enable Salesforce Event Monitoring. Alert on unusual data export activities, especially from non‑admin users.
- Train employees on vishing. The ADT breach started with a phone call. Run simulated voice phishing campaigns. Teach employees to never approve MFA requests they didn't trigger, and to verify caller identity through a known, independent channel (e.g., hang up and call the IT helpdesk directly).
- Implement conditional access policies. Limit access to Salesforce only from managed devices and corporate IP ranges (excluding VPNs where possible).
- Adopt Zero Trust for identity. Assume any user session could be compromised. Continuously verify location, device health, and behavior.
External Resources
- Have I Been Pwned – Check if your email is in the ADT breach (once added)
- CISA Phishing & Vishing Awareness
- BleepingComputer coverage of ADT breach
- KrebsOnSecurity: ADT breach shows why push MFA isn't enough
- ADT official SEC filing (investor relations)
Related Reading on ThreatAft
- ShinyHunters Dumps 1.4M Udemy Records – What's in the Cache and What You Need to Do
- UNC6692 Uses Email Bombing & Microsoft Teams Helpdesk Impersonation to Deploy 'Snow' Malware
- Weaponization of AI: How 2026 Became the Year of Autonomous Cyber Attacks
- Critical Windows IKE RCE (CVE-2026-33824): Patch Your VPN Servers Now
The Bottom Line
The ADT breach is not a story about sophisticated hacking. It's a story about human trust exploited, about the limits of push MFA, and about the interconnected danger of modern SaaS ecosystems. One phone call → one Okta session → one Salesforce export → 5.5 million customers exposed.
For individuals: freeze your credit, monitor your accounts, and treat every unexpected call with suspicion.
For organisations: audit your identity providers, move to phishing‑resistant MFA, and assume that any user with access to sensitive data is a potential pivot point for attackers. The next breach won't start with an exploit – it'll start with a phone ringing.
Stay suspicious. Stay secure. And hang up on strangers offering to “help.”
Written by: ThreatAft Security Team – Specialising in data breach analysis, identity security, and threat actor profiling.