Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

T-Mobile Confirms Hacker Stole Data From 37 Million Customers Accounts | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


T-Mobile is in the process of telling 37 million customers their data was stolen by a hacker earlier this month.

As Bloomberg reports(Opens in a new window), the breach was discovered on Jan. 5 and T-Mobile said(Opens in a new window) it was shut down within 24 hours. The good news is, T-Mobile’s network and systems weren’t breached directly. Instead, the hacker used “a single Application Programming Interface (or API) to obtain limited types of information” from customer accounts.

No passwords, payment card information, social security numbers, government ID numbers, or other sensitive financial information was taken. However, the hacker did manage to grab the “name, billing address, email, phone number, date of birth, account number, and information such as the number of lines on the account and service plan features” for around 37 million customer accounts.

If you are one of the affected T-Mobile customers, expect the company to get in touch. As the information stolen was, as T-Mobile describes it, “the type widely available in marketing databases or directories,” there is currently no talk of compensation or identity protection services for impacted customers.

Recommended by Our Editors

T-Mobile also points out that while it regrets this incident occurred, “we, like any other company, are unfortunately not immune to this type of criminal activity, we plan to continue to make substantial, multi-year investments in strengthening our cybersecurity program.”

Like What You’re Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

var facebookPixelLoaded = false;
window.addEventListener(‘load’, function(){
document.addEventListener(‘scroll’, facebookPixelScript);
document.addEventListener(‘mousemove’, facebookPixelScript);
})

function facebookPixelScript() {
if (!facebookPixelLoaded) {
facebookPixelLoaded = true;
document.removeEventListener(‘scroll’, facebookPixelScript);
document.removeEventListener(‘mousemove’, facebookPixelScript);

!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;
n.push=n;n.loaded=!0;n.version=’2.0′;n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,
document,’script’,’//connect.facebook.net/en_US/fbevents.js’);

fbq(‘init’, ‘454758778052139’);
fbq(‘track’, “PageView”);
}
}

——————————————————–


Click Here For The Original Story From This Source.

National Cyber Security

FREE
VIEW