The Russian-speaking Everest ransomware group claims to have leaked a database allegedly belonging to AT&T Carrier (att.jobs), the telecom giant’s official job and recruitment platform. The site is used by applicants and employees to apply for roles, submit resumes, and manage career-related information.
On the other hand, the ransomware group is offering the alleged personal details of 1.5 million Dublin Airport passengers for $1 million and the data of 18,000 Air Arabia employees for $2 million.
AT&T Carrier Database
It began on October 21, 2025, when Hackread.com reported that the group claimed to have stolen data from AT&T Carrier. The leaked database allegedly contains personal details of more than half a million individuals, which appear to be recruitment, applicant, or employee records rather than customer information.
The group gave the telecom giant six days to respond and contact them, warning that the data would be leaked if no communication was made. Today, the data was indeed released online. An analysis by Hackread.com found that the leak includes two CSV files, one titled user_list and the other customer_list.
The user_list file contains personal data such as email addresses, full names, and phone numbers of 429,103 individuals. The customer_list file includes email addresses, phone numbers, and last names of 147,621 individuals.
Hackread.com reached out to AT&T on October 24, 2025, but the company has not responded.

Dublin Airport Passenger Data
The Everest ransomware group listed Dublin Airport as a victim on its dark web site on October 25, 2025, giving the company six days to respond. As reported by Hackread.com, the group claimed to possess data belonging to 1.5 million (1,533,900) passengers and warned that it would publish the information online if its demands were ignored.
However, for reasons that remain unclear, the group shortened its deadline and is now offering the entire dataset for $1 million. According to their claims, the data includes the following information:
- Full name
- Flight date
- Passenger ID
- Seat number
- Flight number
- Departure airport code
- Destination airport code
- Fast track or priority status
- Compartment or travel class
- Timestamp and barcode format
- Departure date and workstation ID
- Frequent flyer airline, number, and tier
- Operating carrier and marketing carrier
- Sequence number and passenger status
- Version number and number of segments
- Airline designator of the boarding pass issuer
- Free baggage allowance and baggage tag numbers
- Date of issue of the boarding pass and document type
- Airline numeric code and document form serial number
- Source of check-in and source of boarding pass issuance
- Device name, device ID, and device type used for check-in
- First and second non-consecutive baggage tag plate numbers
- Selectee indicator and international document verification status
Irish media has also confirmed the cyber attack.
Air Arabia Employee Data
The ransomware group also claims to have stolen information belonging to 18,000 employees of Air Arabia, a low-cost airline based in the United Arab Emirates with its main hub at Sharjah International Airport.
According to the hackers, the stolen records contain both personal and corporate employee details. The exposed data appears to include identification, contact, and employment information that could be misused for fraud or impersonation. Below is what each data type likely represents:
- Status – Whether the employee is active, terminated, or on leave.
- User ID / Username – Unique internal login identifiers that could help attackers access company systems.
- First name, middle initial, last name, nickname, suffix, title, gender – Standard personal identifiers often used in HR and identity-verification systems.
- Email – Primary company or personal email address, useful for phishing or social engineering attacks.
- Manager, HR contact, department, job code, division – Organisational details that reveal reporting structures and company hierarchy.
- Location and timezone – Worksite or regional information that can narrow down where an employee is based.
- Hire date – Indicates employment tenure and can help craft convincing fake HR or benefits messages.
- Business phone and fax – Direct contact lines
- Address (lines 1 and 2), city, state, ZIP, country – Full physical address information that can expose home or office locations.
- Matrix manager and proxy – Secondary supervisors or account delegates, potentially giving attackers extra targets for access.
- Default locale and login method – Technical settings that might show how employees authenticate, such as single-sign-on or password systems.
- Review frequency, last review date, company exit date, HR performance data and employment status indicators.
- Custom fields (Custom01–Custom15) – Additional HR or system-specific data, which could include sensitive internal notes or identifiers.
- Assignment ID external – A unique number linking the employee to external vendors or contractors.
- Seating chart – Information about the physical desk or office location, which can expose layout and staffing details.
This data is now also for sale for $2 million.

The claims made by the Everest ransomware group add to a growing list of high-profile attacks targeting major companies. Whether all the stolen data is genuine remains unclear, but if confirmed, the impact could be serious for both employees and passengers. So far, AT&T and Air Arabia have not commented on the group’s claims.




