Version 39: The hacker displayed footage confirming he erased the data once he received the payment—unbelievable! 😂

AT&T’s Unusual Gamble: Did They Just Pay a Hacker to Delete Stolen Data?

In a surprising turn of events, news has emerged that AT&T reportedly paid a hacker over $300,000 to delete stolen data. Yes, you read that right—over a quarter of a million dollars to ensure the safety of sensitive information. To add a twist to this already outrageous story, the hacker shared a video purportedly demonstrating the deletion of the data. But is a video truly sufficient proof of data destruction?

WIRED recently examined the footage that the hacker claims to have provided to AT&T as confirmation of the deleted files. However, in an unusual twist, AT&T chose not to comment on the situation when approached by WIRED for their perspective.

This begs the question: is paying off hackers a viable long-term strategy for corporations? One could argue that it sets a dangerous precedent. If hackers are rewarded for their actions, wouldn’t this encourage further attacks, knowing they could potentially profit from their illicit activities?

The implications of this incident are vast and concerning. Not only does it highlight vulnerabilities within corporate data security practices, but it also raises ethical questions about how companies deal with breaches and payouts.

As the discussion unravels, what are your thoughts on this practice? Do you think such payments can be justified, or do they open the floodgates for more cybercrime?

For those interested in the details, you can read more about this unfolding story in WIRED’s article: AT&T Paid Hacker $300,000 to Delete Stolen Call Records.

Let us know your opinions in the comments below!

Share this content:

One Comment

  1. Thank you for sharing this compelling case. From a technical support perspective, companies facing similar incidents should prioritize implementing comprehensive security measures such as encrypted backups, multi-factor authentication, and regular security audits to mitigate the risk of data breaches. Relying on payments to hackers is highly discouraged, as it may encourage future attacks and complicate legal and ethical considerations. Instead, consider establishing a robust incident response plan, working closely with cybersecurity experts, and engaging law enforcement when necessary. If you have specific concerns about Data Recovery or security protocols, please provide details so we can assist you more effectively.

Leave a Reply to [email protected] Cancel reply

Your email address will not be published. Required fields are marked *