Tuesday, April 29, 2025
HomeCyber AttackOnePlus Hacked - Customers' Personal Information Accessed by Hackers

OnePlus Hacked – Customers’ Personal Information Accessed by Hackers

Published on

SIEM as a Service

Follow Us on Google News

OnePlus discloses a security breach, the company says that hackers accessed customers’ personal information users’ name, contact number, email and shipping address.

The security incident was identified by OnePlus last week, some unauthorized user accessed the database where the customer’s information is stored.

The company took immediate steps to stop the intrusion and informs impacted users through the mail. If you are an impacted user then you will be getting an email.

- Advertisement - Google News
OnePlus
OnePlus Breach notice

“OnePlus also confirms that no payment data or passwords are affected, but the name, contact number, email, and shipping address in certain orders may have been exposed,” reads OnePlus statement.

OnePlus didn’t say how many users impacted with the breach or how the hackers gained access to the customers’ information.

The users impacted with data breach may receive spam and phishing email, here you can find the best Ways To Prevent Email Phishing Attacks and to find the website is Safe.

The Chinese handset maker also confirms that “we took immediate steps to stop the intruder and reinforce security, making sure there are no similar vulnerabilities.”

This is not the first time OnePlus suffered the last year January the company suffered a Critical Data breach, financial details of more than 40,000 customers exposed.

“We are continually upgrading our security program – we are partnering with a world-renowned security platform next month, and will launch an official bug bounty program by the end of December.”

T-Mobile Announced a data breach yesterday, in the incident hackers gained access to prepaid customer’s data.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Windows Server 2025 Gets Hotpatching Support Beginning July 1, 2025

Microsoft announced that hotpatching support for Windows Server 2025 will become generally available as...

Critical Linux Kernel Flaw (CVE-2025-21756) Allows Privilege Escalation

A newly disclosed vulnerability in the Linux kernel, tracked as CVE-2025-21756 and dubbed “Attack of the...

Massive Attack: 4,800+ IPs Used to Target Git Configuration Files

A recent surge in cyber reconnaissance has put thousands of organizations at risk after...

CISA Adds Broadcom Brocade Fabric OS Flaw to Known Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent security advisory...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Massive Attack: 4,800+ IPs Used to Target Git Configuration Files

A recent surge in cyber reconnaissance has put thousands of organizations at risk after...

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...