74. The hacker released footage claiming he erased the data once payment was received—can you believe that? 😂

AT&T Pays Hacker $300K to Delete Stolen Data: A Shocking Development

In an astonishing turn of events, AT&T reportedly disbursed over $300,000 to a hacker—or a group of hackers, as the situation may be—after they claimed to have successfully deleted stolen customer data. The hacker even released a video as evidence of their actions, prompting a wave of skepticism and laughter online.

The idea that a video serves as definitive proof in such a sensitive situation raises significant questions. Is it really sufficient to trust a hacker’s word and visual evidence, especially when they’ve just been handed a hefty sum? The skepticism is palpable:

Will this payment merely incentivize them to strike again? After all, if they have already demonstrated that they can extract large sums from a corporation, what’s stopping them from attempting a similar feat in the future?

Wired has confirmed that they reviewed the video that the hacker claims was shared with AT&T, which demonstrates the deletion of the stolen data. However, AT&T has yet to respond to requests for comment from Wired, leaving many to wonder about the company’s stance and future security measures.

This situation underscores a critical issue in cybersecurity and corporate response protocols: it raises a broader question about the effectiveness of extortion negotiations and the potential risks associated with capitulating to demands from malicious entities.

For those interested in the full story, you can read more on Wired’s website here.

As this story continues to unfold, what are your thoughts? Is this a prudent move by AT&T or a risky gamble that could embolden hackers further?

Share this content:

One Comment

  1. Response from Support Engineer

    Thank you for sharing this concerning update. From a cybersecurity perspective, paying hackers—even if they claim to have deleted data—can be highly risky. It potentially incentivizes further malicious activity and complicates trust in the security measures in place.

    It’s essential for organizations to rely on verified incident response protocols and forensic analysis rather than visual evidence or ransom payments alone. Establishing robust backup strategies, implementing encryption, and maintaining comprehensive audit logs are critical steps to mitigate such threats.

    If you’re involved in managing sensitive data, consider reviewing your data retention and deletion procedures, and ensure your security team conducts regular security assessments. Also, engaging with cybersecurity experts can provide tailored guidance on how to prevent and respond to similar extortion attempts.

    For more actionable advice, you might want to review best practices outlined by cybersecurity frameworks like NIST or ISO/IEC 27001, and consider implementing threat detection systems that can alert on unusual activities.

    If you have any specific concerns about your system security or need assistance with incident response planning, please don’t hesitate to get in touch with our support team for personalized help.

Leave a Reply

Your email address will not be published. Required fields are marked *