Monday, January 20, 2025
HomeCyber Security NewsT-Mobile App Glitch Exposes Other User’s Sensitive Data

T-Mobile App Glitch Exposes Other User’s Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy.

Users have reported accessing sensitive information belonging to other customers when logging into their own accounts. 

This alarming situation has raised questions about the security of personal data within T-Mobile’s systems.

The incident was first reported in Verge, an American technology news website operated by Vox Media, publishing news, feature stories, guidebooks, product reviews, consumer electronics news, and podcasts.

Several T-Mobile customers took to social media platforms, including X (formerly Twitter) and Reddit, to share their unsettling experiences.

Reports indicate that users could view a range of sensitive data, including contact numbers, device IDs, credit card information, and even home addresses of fellow customers. 

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

This revelation has understandably sparked widespread concern among T-Mobile’s user base.

The full extent of this issue remains uncertain, as some users have indicated that they could access information from multiple accounts.

To safeguard the affected individuals and maintain security, the T-Mobile subreddit has urged its users not to share any further information regarding this incident.

Temporary Technical Glitch

T-Mobile initially attributed the problem to a “technology update” glitch and assured users that it had been resolved as of Wednesday afternoon. 

Tara Darrow, a spokesperson for T-Mobile, stated, “There was no cyberattack or breach at T-Mobile. 

This temporary system glitch was related to a planned overnight technology update involving limited account information for fewer than 100 customers, which was quickly resolved.” 

However, this explanation may raise further questions about the adequacy of T-Mobile’s security protocols.

It’s worth noting that this is not the first time T-Mobile has encountered security-related issues this year. The company disclosed two separate cybersecurity attacks in January and May, highlighting the importance of ensuring robust data protection measures.

As T-Mobile users anxiously await more information and reassurance regarding their data security, this incident serves as a stark reminder of the ongoing challenges faced by companies in safeguarding sensitive customer information in an increasingly interconnected digital landscape.

  • On September 20th, 7:30 AM ET, T-Mobile officially acknowledged the issue.
  • On September 20th, 2:35 PM ET, T-Mobile provided a statement confirming that the issue had been resolved and asserting that it was not a security breach.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...

New IoT Botnet Launching Large-Scale DDoS attacks Hijacking IoT Devices

Large-scale DDoS attack commands sent from an IoT botnet's C&C server targeting Japan and...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS

Researchers uncovered several significant vulnerabilities within Azure DevOps, specifically focusing on potential Server-Side Request...

Hackers Weaponize npm Packages To Steal Solana Private Keys Via Gmail

Socket’s threat research team has identified a series of malicious npm packages specifically designed...

Hackers Weaponize MSI Packages & PNG Files to Deliver Multi-stage Malware

Researchers have reported a series of sophisticated cyber attacks aimed at organizations in Chinese-speaking...