T-Mobile App Glitch Exposes Other User’s Sensitive Data

The mobile application of T-Mobile has recently been a cause of concern among its customers due to issues concerning privacy.

Users have reported accessing sensitive information belonging to other customers when logging into their own accounts. 

This alarming situation has raised questions about the security of personal data within T-Mobile’s systems.

The incident was first reported in Verge, an American technology news website operated by Vox Media, publishing news, feature stories, guidebooks, product reviews, consumer electronics news, and podcasts.

Several T-Mobile customers took to social media platforms, including X (formerly Twitter) and Reddit, to share their unsettling experiences.

Reports indicate that users could view a range of sensitive data, including contact numbers, device IDs, credit card information, and even home addresses of fellow customers. 

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

This revelation has understandably sparked widespread concern among T-Mobile’s user base.

The full extent of this issue remains uncertain, as some users have indicated that they could access information from multiple accounts.

To safeguard the affected individuals and maintain security, the T-Mobile subreddit has urged its users not to share any further information regarding this incident.

Temporary Technical Glitch

T-Mobile initially attributed the problem to a “technology update” glitch and assured users that it had been resolved as of Wednesday afternoon. 

Tara Darrow, a spokesperson for T-Mobile, stated, “There was no cyberattack or breach at T-Mobile. 

This temporary system glitch was related to a planned overnight technology update involving limited account information for fewer than 100 customers, which was quickly resolved.” 

However, this explanation may raise further questions about the adequacy of T-Mobile’s security protocols.

It’s worth noting that this is not the first time T-Mobile has encountered security-related issues this year. The company disclosed two separate cybersecurity attacks in January and May, highlighting the importance of ensuring robust data protection measures.

As T-Mobile users anxiously await more information and reassurance regarding their data security, this incident serves as a stark reminder of the ongoing challenges faced by companies in safeguarding sensitive customer information in an increasingly interconnected digital landscape.

  • On September 20th, 7:30 AM ET, T-Mobile officially acknowledged the issue.
  • On September 20th, 2:35 PM ET, T-Mobile provided a statement confirming that the issue had been resolved and asserting that it was not a security breach.

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Divya

Recent Posts

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense for initial access. Qlik Sense is…

15 hours ago

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in…

17 hours ago

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and…

18 hours ago

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical vulnerability that threat actors could potentially…

19 hours ago

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests. …

1 day ago

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed that the North Korean hacker group…

2 days ago