You know that sinking feeling when a company you trust – the one that literally secures your home – gets hacked? That's the reality for ADT customers this week.

The home security giant ADT confirmed a data breach affecting 5.5 million customers after the ShinyHunters extortion group leaked a massive cache of customer records. The attack didn't start with a sophisticated exploit or a zero‑day. It started with a voice phishing call – and an employee who picked up the phone.

This is the story of how a single conversation led to the compromise of Okta, then Salesforce, then millions of customer records. And it's a wake‑up call for every organization relying on SaaS identity providers.

Cybersecurity illustration: a cracked ADT logo overlaid with a phone receiver, a lock icon, and a database icon. Dark navy background with cyan and purple accents.

The Breach at a Glance

Item Details
VictimADT Inc. (home security)
Affected customers5.5 million (according to ShinyHunters)
Data exposedNames, phone numbers, physical addresses, dates of birth (partial), last 4 digits of SSN (partial)
Attack vectorVoice phishing (vishing) → Okta SSO compromise → Salesforce data exfiltration
Threat actorShinyHunters (same group behind Udemy, Ticketmaster, Rockstar Games)
Data leak dateApril 27, 2026
ADT confirmationYes (SEC filing, customer notifications)

The Attack Chain: From a Phone Call to Full Compromise

ShinyHunters didn't hack ADT's firewall or exploit a zero‑day in Salesforce. They called an employee.

🔵 Step 1: The Vishing Call

Sometime before April 2026, an ADT employee received a phone call. The caller claimed to be from IT support, perhaps from a trusted partner. Using social engineering, they convinced the employee to approve a multi‑factor authentication (MFA) push notification or to reveal a one‑time passcode. This is a classic “MFA fatigue” attack – bombarding the user with approval requests until they finally accept out of frustration or confusion.

With that approval, the attacker gained access to the employee's Okta single sign-on (SSO) account. They now had a legitimate, authenticated session inside ADT's identity management system.

🟠 Step 2: Okta as the Launchpad

Once inside Okta, the attackers could see which cloud applications the employee could access. They looked for high‑value targets – and found Salesforce. ADT uses Salesforce to manage customer accounts, support tickets, and marketing data. The compromised employee had permission to export customer records.

Using the stolen Okta session, the attackers simply logged into ADT's Salesforce instance as a legitimate user. No further hacking required.

🟡 Step 3: Data Exfiltration from Salesforce

Inside Salesforce, the attackers ran automated bulk export tools to extract customer data. According to ADT's SEC filing, the stolen data included:

The attackers then packaged the data – reportedly 11GB – and prepared to leak it if ADT didn't pay a ransom.

Flowchart: Vishing call → Okta SSO compromise → Salesforce login → Bulk export → Data leak. Dark navy background, cyan arrows, purple nodes.

Why Traditional MFA Failed

ADT had multi‑factor authentication. It didn't stop the attack. Why?

Because not all MFA is equal. ADT was using push‑based MFA (e.g., “Approve” or “Deny” notifications). Attackers can defeat this through:

Phishing‑resistant MFA – such as FIDO2 security keys (YubiKeys) or certificate‑based authentication – would have blocked this attack entirely. The attacker cannot approve a hardware key prompt because they don't have the physical device.

As one security researcher noted: “The ADT breach is a textbook example of why you need to move beyond push MFA. Vishing turns a human into a proxy for the attacker.”

🔍 HUNTER'S NOTE: Detecting Okta → Salesforce Pivots
Monitor Okta logs for unusual application access patterns – especially an employee accessing Salesforce from a new device, at odd hours, or exporting large volumes of data. Enable Salesforce Event Monitoring to alert on bulk data exports (e.g., Data Export Service, Report Exports). The combination of a low‑privilege user suddenly performing high‑volume exports is a red flag.

What Data Was Actually Exposed? (And What Wasn't)

According to ADT's official SEC filing and customer notifications:

Data Type Exposed? Notes
Names✅ YesFull customer names
Phone numbers✅ YesPrimary contact numbers
Physical addresses✅ YesHome addresses
Email addresses⚠️ SomeNot all customers affected
Dates of birth⚠️ Small %Partial for some customers
Last 4 digits of SSN⚠️ Small %Most concerning
Full SSN❌ NoNot in leaked dataset
Credit card / bank info❌ NoNot stored in affected systems

The most dangerous elements are the partial SSNs and dates of birth. Combined with names and addresses, attackers can attempt identity fraud, account takeover, and targeted phishing.

Uncertainty & Open Questions

While ADT has confirmed the breach, several details remain unclear:

ThreatAft will update this article as more information becomes available.

What You Should Do If You're an ADT Customer

ADT has notified affected customers. If you haven't received a notification but want to be proactive:

🔴 Immediate Steps

🟠 For Organizations (Lessons from ADT)

External Resources

Related Reading on ThreatAft

The Bottom Line

The ADT breach is not a story about sophisticated hacking. It's a story about human trust exploited, about the limits of push MFA, and about the interconnected danger of modern SaaS ecosystems. One phone call → one Okta session → one Salesforce export → 5.5 million customers exposed.

For individuals: freeze your credit, monitor your accounts, and treat every unexpected call with suspicion.

For organisations: audit your identity providers, move to phishing‑resistant MFA, and assume that any user with access to sensitive data is a potential pivot point for attackers. The next breach won't start with an exploit – it'll start with a phone ringing.

Stay suspicious. Stay secure. And hang up on strangers offering to “help.”

Written by: ThreatAft Security Team – Specialising in data breach analysis, identity security, and threat actor profiling.