Sunday, March 16, 2025
HomeCyber Security NewsT-Mobile App Glitch Exposes Other User’s Sensitive Data

T-Mobile App Glitch Exposes Other User’s Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy.

Users have reported accessing sensitive information belonging to other customers when logging into their own accounts. 

This alarming situation has raised questions about the security of personal data within T-Mobile’s systems.

The incident was first reported in Verge, an American technology news website operated by Vox Media, publishing news, feature stories, guidebooks, product reviews, consumer electronics news, and podcasts.

Several T-Mobile customers took to social media platforms, including X (formerly Twitter) and Reddit, to share their unsettling experiences.

Reports indicate that users could view a range of sensitive data, including contact numbers, device IDs, credit card information, and even home addresses of fellow customers. 

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

This revelation has understandably sparked widespread concern among T-Mobile’s user base.

The full extent of this issue remains uncertain, as some users have indicated that they could access information from multiple accounts.

To safeguard the affected individuals and maintain security, the T-Mobile subreddit has urged its users not to share any further information regarding this incident.

Temporary Technical Glitch

T-Mobile initially attributed the problem to a “technology update” glitch and assured users that it had been resolved as of Wednesday afternoon. 

Tara Darrow, a spokesperson for T-Mobile, stated, “There was no cyberattack or breach at T-Mobile. 

This temporary system glitch was related to a planned overnight technology update involving limited account information for fewer than 100 customers, which was quickly resolved.” 

However, this explanation may raise further questions about the adequacy of T-Mobile’s security protocols.

It’s worth noting that this is not the first time T-Mobile has encountered security-related issues this year. The company disclosed two separate cybersecurity attacks in January and May, highlighting the importance of ensuring robust data protection measures.

As T-Mobile users anxiously await more information and reassurance regarding their data security, this incident serves as a stark reminder of the ongoing challenges faced by companies in safeguarding sensitive customer information in an increasingly interconnected digital landscape.

  • On September 20th, 7:30 AM ET, T-Mobile officially acknowledged the issue.
  • On September 20th, 2:35 PM ET, T-Mobile provided a statement confirming that the issue had been resolved and asserting that it was not a security breach.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...