The ADT data breach exposed 5,488,888 records including Dates of birth, Email addresses, Names, Partial government issued IDs, Phone numbers, Physical addresses. This breach has been verified by HaveIBeenPwned. Affected users should check HaveIBeenPwned.com and take immediate steps to protect their accounts.
What Happened
In April 2026, home security firm ADT confirmed a data breach by ShinyHunters, which listed the company on its website as part of a "pay or leak" extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone numbers and physical addresses. ADT also advised that "in a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included" and that it had contacted all affected people.
- Breach date
- 2026-04-20
- Records affected
- 5,488,888
- Verified
- Yes
- Domain
- adt.com
What Was Exposed
The following data types were included in the breach:
- Dates of birth
- Email addresses
- Names
- Partial government issued IDs
- Phone numbers
- Physical addresses
What You Should Do
If you had an account with ADT, take these steps immediately:
- Check if your account was affected at HaveIBeenPwned.com
- Watch for phishing emails that reference the breach or impersonate the affected company
- Place a fraud alert or credit freeze with all three credit bureaus (Equifax, Experian, TransUnion)
- Monitor your credit report for unauthorized accounts or inquiries
- Be alert for social engineering attempts using your exposed personal information
- Enable two-factor authentication on the affected service if available
- Consider using a password manager to generate unique passwords for each service
FAQ
Was my data in the ADT breach?
What should I do if my data was exposed in the ADT breach?
When did the ADT data breach happen?
Need Incident Response?
Sherlock Forensics investigates data breaches for organizations. We determine scope of exposure, identify attack vectors, preserve evidence for legal proceedings and help you meet notification requirements.
Get Incident Response Help