Was Your Information Exposed in the ADT Data Breach? What Was Stolen—and What You Should Do Next

April 28, 2026
by
Pulkit Gupta
deleteme

If you’ve ever handed a company your name, email, phone number, and home address, you already know the feeling: one breach headline and your stomach drops. The reported ADT breach is one of those moments. Have I Been Pwned says 5.5 million people may be affected . The good news: ADT says customer security systems weren’t compromised, and no payment info was accessed . The bad news: personal data is still personal data, and it’s enough to fuel scams. Let’s get clear on what was taken, how it happened, and what to do right now.

Was your data in it? Start with a fast exposure check

“5.5 million affected” can sound abstract until you translate it into real life: it means a leaked file can include millions of individual records, and you won’t know if yours is one of them just by guessing. Have I Been Pwned (HIBP) reviewed the stolen data and reported the breach exposed data tied to 5.5 million people .

If you’ve ever been an ADT customer (or even just interacted with them using your real contact info), do a quick check now. It takes minutes and it answers the only question that matters at this stage: Was my email in the ADT data breach dataset?

Step 1: Check Have I Been Pwned for the ADT breach

  1. Go to HIBP and use the “email address” search with the email you used for ADT.
  2. If it shows the ADT entry, open it and read the fields listed as exposed. HIBP’s analysis says the breach data includes items like unique email addresses, names, phone numbers, physical addresses, and in some cases dates of birth and partial government-issued IDs .

A quick note: HIBP checks are typically email-based, so if you’ve had multiple ADT accounts over the years (personal email, work email, “family” inbox), check each one.

Step 2: Don’t just check—document

If your email is listed (or you’re not sure which email you used), write down a clean “breach snapshot.” You’ll use this for account lockdown, scam-spotting, and support calls.

Document:

  • Every email you might’ve used with ADT (past and present)
  • Phone number(s) and home address(es) that were on your ADT account
  • The approximate timeframe you were a customer (even rough years help)
  • Whether you ever uploaded/typed extra profile info (DOB, etc.)

Step 3: Treat “not found” as a result—not a free pass

If HIBP doesn’t show your email, that’s good. It still doesn’t mean scammers won’t try, because breach-driven fraud often targets anyone who “looks like” a customer. The practical move is: use the check to decide your urgency, then proceed like you’re a potential target for ADT impersonation scams until the noise dies down.

At this point, the goal isn’t panic. It’s clarity—confirm exposure, capture the details, and get ready to act on the specific data types that were actually involved .

What was stolen (and what wasn’t): the details that matter

Once you’ve checked exposure, the next question is simple: what exactly could an attacker do with what was taken? With the ADT data breach, the risk is less about draining a bank account overnight and more about identity-based scams that work because the details sound real.

What was reportedly exposed

Have I Been Pwned’s analysis of the leaked dataset says it includes personal data tied to 5.5 million people, including: unique email addresses, names, phone numbers, physical addresses, and in some cases dates of birth and partial government-issued IDs .

ADT also told BleepingComputer its investigation found the information involved was limited to names, phone numbers, and addresses, with dates of birth and the last four digits of Social Security numbers or Tax IDs included in a small percentage of cases .

Here’s why each item matters in practice:

  • Name + phone number: perfect for “ADT support” calls, fake verification texts, and SIM-swap pretexts.
  • Physical address: makes scam scripts scary convincing (“I’m calling about your system at 123 Main St…”).
  • Date of birth (in some cases): often used as a “security question” or identity check.
  • Last four of SSN / Tax ID (small percentage): not enough to open every door, but it can help scammers pass weak ID checks or sound legit when pressuring you.

What ADT says was not accessed

This is the part that should lower the temperature a bit:

  • No payment information was accessed, including bank accounts or credit cards .
  • Customer security systems were not affected or compromised .

The takeaway (plain English)

Even if no payment data was taken, this kind of exposed personal info is still enough to fuel phishing, vishing, and targeted impersonation—especially when a scammer can quote your contact details back to you like they’re reading your file .

How it allegedly happened: a “vishing” call, an SSO takeover, then Salesforce

The exposed fields matter, but the “how” matters too—because it tells you what kind of attacker playbook you’re dealing with.

According to reporting shared with BleepingComputer, the extortion group ShinyHunters claimed they got in by compromising an employee’s Okta single sign-on (SSO) account using a voice phishing (“vishing”) attack, then using that access to pull data from ADT’s Salesforce instance .

What “vishing” means (plain English)

Vishing = phishing over the phone.

Instead of sending a sketchy email link, the attacker calls someone and tries to talk them into doing something that hands over access—like:

  • reading out a one-time code
  • approving a push notification
  • “confirming” a login they didn’t start
  • resetting credentials because the caller claims there’s an emergency

It works because it hits the human layer. You can have strong security tools, and still lose if a person is convinced the attacker is “IT,” “Okta support,” or a manager with a deadline.

The chain: Okta SSO → connected apps → Salesforce data

SSO is meant to make life easier: one login, many apps. The downside is the same convenience can turn into a multiplier.

Here’s the alleged path in simple steps:

  1. Okta SSO account compromised via vishing
  2. Attacker uses that SSO session to access connected SaaS apps (the ones employees can reach after signing in)
  3. Data is taken from a high-value system—here, Salesforce

BleepingComputer notes ShinyHunters has been linked to widespread vishing campaigns targeting SSO accounts (including Okta) and then stealing data from connected services like Salesforce and others .

Why this pattern keeps showing up

When companies connect everything to identity (SSO), identity becomes the “master key.” One successful con on one employee can be enough to pivot into the tools that store customer records.

That’s why, for you as a customer, the practical threat after a breach like this usually isn’t “hack your alarm panel.” It’s scammers using stolen details and social engineering—the same human-trust trick, just pointed at you next.

What you should do next (in order): lock accounts, spot scams, reduce fallout

When a breach starts with social engineering, you should assume the follow-up will too. And with this incident being tied to stolen personal info (and in some cases partial IDs) 【】, the safest move is to tighten accounts fast and get picky about every call and text that claims to be “ADT.”

Your 48-hour plan (do this in order)

1) Lock down ADT access

  • Change your ADT password (make it long and random).
  • If you ever reused that password anywhere else, change those too (email, banking, shopping—start with the accounts you’d hate to lose).
  • Turn on MFA/2FA anywhere it’s offered. If you can choose, prefer an authenticator app over SMS.

2) Secure your email (this is the real “master key”)

Attackers love email because it’s where password resets land.

  • Change your email password (again: long, random).
  • Turn on MFA for email.
  • Check for mail forwarding rules and filters you didn’t create (a common way to spy on you quietly).
  • Review recent sign-ins and sign out of other devices/sessions.

3) Add tripwires

  • Turn on login alerts (email, bank, ADT, credit card portals).
  • Save screenshots or notes of anything suspicious (timestamps help later).

Scams to expect after the ADT data breach

Based on what was reportedly accessed—contact info and, in a small percentage, DOB and last four of SSN/Tax ID 【】—these are the patterns that tend to show up:

  • Fake ADT support calls (vishing): “We need to verify your account” or “Your system needs an urgent update.”
    Goal: get you to share a code, approve a push, or “confirm” details.
  • “Account verification” texts: short links, urgency, and threats like service suspension.
    Goal: steal credentials or payment info that wasn’t in the breach.
  • Address-based confidence tricks: “I’m calling about your home at [your address].”
    Goal: make you feel they’re legitimate, then extract more info.

Hard rule: If someone calls you, don’t authenticate to them. Hang up and call back using the number on your official billing statement or the company’s official website.

Credit monitoring vs fraud alert vs credit freeze (quick decision guide)

  • Credit monitoring: Good for visibility. It tells you after something changes. It doesn’t block new accounts by itself.
  • Fraud alert: A lighter step. It asks lenders to take extra steps to verify identity. Useful if you want less friction.
  • Credit freeze: The strongest option for stopping new credit in your name. If you suspect your record included DOB + last four of SSN/Tax ID (even though it was reported as a small percentage) 【】, a freeze is the cleanest way to cut off the most expensive kind of fallout.

None of this is about being paranoid. It’s about refusing to be an easy target when your contact details are already in circulation.

Lower your exposure going forward: stop handing out your real contact info everywhere

If there’s one practical lesson from breaches like this, it’s that your email + phone + home address is basically a reusable “identity bundle.” Once it leaks, you can’t un-leak it. You can only reduce how often you reuse it.

The simple strategy: compartmentalize your identity

Think in buckets. Not because it’s fancy—because it limits blast radius.

Bucket your contact info like this:

  • Financial + government: one dedicated email, locked down, never used for shopping or signups.
  • Home services (security, utilities, internet): a separate email and phone number.
  • Shopping + subscriptions: another email alias you can abandon if it gets noisy.
  • “I just need the discount code” forms: a throwaway alias, always.

When one bucket gets hit, you don’t spend months cleaning up your whole life.

A practical setup that doesn’t turn into a hobby

You don’t need 30 inboxes and a spreadsheet.

Use:

  • Email aliases that still route to your main inbox (so you can receive messages without exposing your primary address)
  • Secondary phone numbers for signups and vendor callbacks (so your real number isn’t the permanent target)

This is also how you spot shady behavior faster. If an alias you used only for one company starts getting spam, you’ve learned something useful.

Where masked contact info helps (and why it’s not overkill)

Masked emails and phone numbers are basically “swap-out parts” for your identity.

If your ADT-linked details get targeted with fake support calls or “account verification” texts, being able to turn off a specific alias beats trying to change your real phone number.

Tools like Cloaked fit here in a straightforward way: you can create masked emails and masked phone numbers for signups, and if one gets abused, you can shut it down without changing your real contact info everywhere. That’s not a magic shield, but it does limit how far one breach can follow you.

A quick rule to live by

If a company doesn’t need your real details to do the job, don’t give them the real ones.

Save the “real identity bundle” for the accounts that would actually hurt if they went sideways.

View all

What the Medtronic Data Breach Means for You (If Your Data or Business Touches Their Network)

Data Breaches
by
Arjun Bhatnagar

Could You Fall for This $230M Bitcoin Heist? What a 70‑Month Sentence Teaches You About Crypto Scams

Data Breaches
by
Abhijay Bhatnagar

If Itron Can Be Breached, What Does That Mean for Your Critical Infrastructure Cybersecurity?

Data Breaches
by
Abhijay Bhatnagar