T-Mobile Decides To Settle $350 Million For Massive 2021 Data Breach

A class-action lawsuit brought by a group of customers against T-Mobile relating to the 2021 hack has been settled for $500 million. Approximately 76.6 million US residents’ personal information has been exposed due to this data breach.

T-Mobile is claiming that as part of the proposed agreement, it will contribute $350 million to a settlement fund that will be used for:-

  • Lawyers
  • Fees
  • People who file claims

Moreover, the company will have to spend $150 million over the next two years (2022 and 2023) to deal with data security and related technologies.

Data Breach

Over 100 million records of the company’s customers were being sold on the black market after their systems were breached. The types of data that were compromised are listed below:-

  • Social Security numbers
  • Names
  • Addresses
  • Driver’s license information

There is still a need for a judge to approve the proposed settlement agreement before it becomes effective. 

T-Mobile, however, will have 10 days to put money into the fund if it is approved, so that it can notify the people who are eligible for the fund to pay for the costs.

There are no estimates contained in the settlement agreement as to how much each claimant will likely receive based on the settlement agreement. 

The problem is that it is incomprehensible to estimate such a thing until an exact number of people is known who will file claims for compensation.

Lawsuit

It is alleged that T-Mobile will be forced to settle a class-action lawsuit that accuses it of:-

  • Failing to protect customers’ data
  • Not properly notifying people impacted
  • Inadequate data security

During the settlement negotiations, T-Mobile denied many of these allegations and argued that the agreement was not an admission of guilt. 

Under the terms of a proposed agreement submitted to the Securities and Exchange Commission, T-Mobile states that under certain conditions outlined in the proposed agreement, it is capable of terminating the agreement at any time. 

Despite this, they acknowledge that they will have to compensate the impacted customers. The data breach that occurred at T-Mobile was not the only response to the data breach, as there have been other responses as well. 

Moreover, T-Mobile has also been accused of selling users’ information to marketers according to another report that appeared recently.

While it has been reported that T-Mobile has just launched a new program known as App Insights. In just over a year, it has gone from being a beta program to being fully operational.

A revised version of the FCC’s (Federal Communications Commission) rules on such attacks was proposed earlier this year. As a result of these new rules, companies and the people they serve will be able to communicate better with each other.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Exploiting AES Encryption for Stealthy Payload Protection

Cybersecurity researchers have uncovered a surge in the use of Advanced Encryption Standard (AES) encryption…

6 hours ago

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in cyber…

6 hours ago

Routers Under Attack as Scanning Attacks on IoT and Networks Surge to Record Highs

In a concerning trend, the frequency of scanning attacks targeting Internet of Things (IoT) devices…

6 hours ago

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and…

11 hours ago

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell…

13 hours ago

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in…

13 hours ago