Wednesday, November 6, 2024
HomeCyber Security NewsT-Mobile App Glitch Exposes Other User’s Sensitive Data

T-Mobile App Glitch Exposes Other User’s Sensitive Data

Published on

Malware protection

The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy.

Users have reported accessing sensitive information belonging to other customers when logging into their own accounts. 

This alarming situation has raised questions about the security of personal data within T-Mobile’s systems.

- Advertisement - SIEM as a Service

The incident was first reported in Verge, an American technology news website operated by Vox Media, publishing news, feature stories, guidebooks, product reviews, consumer electronics news, and podcasts.

Several T-Mobile customers took to social media platforms, including X (formerly Twitter) and Reddit, to share their unsettling experiences.

Reports indicate that users could view a range of sensitive data, including contact numbers, device IDs, credit card information, and even home addresses of fellow customers. 

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

This revelation has understandably sparked widespread concern among T-Mobile’s user base.

The full extent of this issue remains uncertain, as some users have indicated that they could access information from multiple accounts.

To safeguard the affected individuals and maintain security, the T-Mobile subreddit has urged its users not to share any further information regarding this incident.

Temporary Technical Glitch

T-Mobile initially attributed the problem to a “technology update” glitch and assured users that it had been resolved as of Wednesday afternoon. 

Tara Darrow, a spokesperson for T-Mobile, stated, “There was no cyberattack or breach at T-Mobile. 

This temporary system glitch was related to a planned overnight technology update involving limited account information for fewer than 100 customers, which was quickly resolved.” 

However, this explanation may raise further questions about the adequacy of T-Mobile’s security protocols.

It’s worth noting that this is not the first time T-Mobile has encountered security-related issues this year. The company disclosed two separate cybersecurity attacks in January and May, highlighting the importance of ensuring robust data protection measures.

As T-Mobile users anxiously await more information and reassurance regarding their data security, this incident serves as a stark reminder of the ongoing challenges faced by companies in safeguarding sensitive customer information in an increasingly interconnected digital landscape.

  • On September 20th, 7:30 AM ET, T-Mobile officially acknowledged the issue.
  • On September 20th, 2:35 PM ET, T-Mobile provided a statement confirming that the issue had been resolved and asserting that it was not a security breach.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

ClickFix Exploits GMeet & Zoom Pages to Deliver Sophisticated Malware

A new tactic, "ClickFix," has emerged. It exploits fake Google Meet and Zoom pages...

APT36 Hackers Attacking Windows Deevices With ElizaRAT

APT36, a sophisticated threat actor, has been actively targeting Indian entities with advanced malware...

Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints

Researchers uncovered two previously unknown endpoints with older Cortex XDR agents that used to...

Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers

The Phish, 'n' Ships fraud operation leverages, compromised websites to redirect users to fake...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

ClickFix Exploits GMeet & Zoom Pages to Deliver Sophisticated Malware

A new tactic, "ClickFix," has emerged. It exploits fake Google Meet and Zoom pages...

APT36 Hackers Attacking Windows Deevices With ElizaRAT

APT36, a sophisticated threat actor, has been actively targeting Indian entities with advanced malware...

Hackers Using AV/EDR Bypass Tool From Cybercrime Forums To Bypass Endpoints

Researchers uncovered two previously unknown endpoints with older Cortex XDR agents that used to...