[EVEREST] – Ransomware Victim: AT&T Careers
![[EVEREST] - Ransomware Victim: AT&T Careers 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating to the content should be directed at the attackers, not RedPacket Security. This blog is an editorial notice informing that a company has fallen victim to a ransomware attack. RedPacket Security is not affiliated with any ransomware threat actors or groups and will not host infringing content. The information on this page is automated and redacted whilst being scraped directly from the EVEREST Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On October 21, 2025, a ransomware leak post claims AT&T Careers is the victim. The page frames AT&T Careers as the employment division of a major U.S. telecommunications company and lists opportunities across technology, sales, marketing, customer service, cybersecurity, and related fields, emphasizing a diverse and inclusive workplace. The page is labeled as AI-generated content and identifies the industry as Telecommunication with a U.S. base. The post does not specify whether the attack encrypted systems or resulted in a data leak, and there are no ransom figures shown in the excerpt. In the absence of a stated compromise date, the post date is used as 2025-10-21. A claim URL is present on the leak page (the actual link is defanged in this summary).
From the available data, there are no screenshots or image attachments noted; the visible content is textual and includes an AI-generated recruitment blurb describing roles in technology, sales, marketing, customer service, and cybersecurity, with references to internships, entry-level positions, management, and experienced roles, as well as benefits and a diverse, inclusive workplace. No personal data (emails, phone numbers, or addresses) appears in the excerpt, and any PII has been redacted. A claim URL is indicated but the exact address is not provided here. Overall, the leak page appears to focus on HR or recruitment material rather than operational or sensitive data, consistent with the victim name provided.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.