78. Hacker Demos Proof of Data Deletion After Payment with a Video—Unbelievable! 😂


AT&T Pays Hacker $300,000 for Data Deletion: A Shocking Turn of Events

In a surprising twist in the world of cybersecurity, AT&T reportedly handed over a staggering $300,000 to a hacker or group of hackers, supposedly in exchange for assurances that stolen data had been obliterated. But the most eyebrow-raising detail? The hacker shared a video purportedly demonstrating the deletion of this sensitive information.

This scenario leaves many questioning the credibility of a video as indisputable proof. After all, if a hacker can so easily erase potentially damaging data, could this also embolden them to strike again? The logic of paying a hacker is puzzling: wouldn’t it simply encourage future attacks?

WIRED has obtained insights into the video that AT&T received from the hacker, although the telecom giant has yet to provide any comments regarding the incident. It raises critical discussions around the ethics of such actions in the ongoing battle against cybercrime.

For those curious about the full details, WIRED has an in-depth article that covers this unusual event.

Read more about the incident here.

Stay informed as we track the evolving landscape of cybersecurity!


This revised blog post captures the essence of the original Reddit post while offering a polished and professional outlook suitable for a broader audience.

Share this content:

One Comment

  1. Thank you for sharing this intriguing case. From a technical perspective, it’s important to approach such videos with a healthy dose of skepticism, as they can sometimes be manipulated or staged. If you’re considering similar scenarios, ensure that any proof of data deletion is verified through multiple, independent methods such as:

    • Implementing comprehensive audit logs that timestamp all data modification and deletion events.
    • Using secure deletion methods that overwrite data and prevent recovery, such as shred on Linux or specialized data sanitization tools.
    • Maintaining backups and snapshots that enable restoration in case of mistaken or malicious deletions.

    If the goal is to demonstrate successful data deletion in a professional environment, consider recording a screen capture of the process with timestamped logs, and use verified tools designed for secure data erasure. Remember, trusting visual proof alone, especially from unverified sources, can be risky. Always adhere to best practices for cybersecurity and data management.

Leave a Reply

Your email address will not be published. Required fields are marked *