T-Mobile recently confirmed another hack, the second this year and ninth since 2018, revealing customer data and account PINs.
While T-Mobile confirmed a recent system detection that revealed a threat actor had accessed a small number of accounts, which compromised limited information.
836 customers were affected by the intrusion, which commenced on February 24 and continued till March 30.
Once T-Mobile discovered the breach on March 27, they reset customers’ account PINs to swap SIM cards and authorize critical account changes.
Here below, we have mentioned the types of data involve:-
T-Mobile’s security measures worked as intended in March 2023, alerting them to unauthorized activity.
During late February through March 2023, a threat actor gained access to restricted data from a few T-Mobile accounts, as revealed by their security system.
This year’s second T-Mobile hack is the ninth security breach since 2018, and in January, the misuse of T-Mobile’s application programming enabled threat actors to access 37 million customers’ data.
Despite having several safeguards to prevent unauthorized access, T-Mobile acknowledges the need to enhance its security measures continually.
They take such incidents seriously, apologize for the breach, and are working towards improving the security of customers’ information.
T-Mobile reset their customers’ T-Mobile Account PIN to safeguard their accounts. Additionally, they provide free identity theft detection services and credit monitoring for two years through Transunion’s myTrueIdentity.
Moreover, T-Mobile conducts a thorough investigation to understand unauthorized activity and improve its safeguards to prevent such incidents from happening again.
Here below, we have mentioned all the recommendations offered by T-Mobile:-
Struggling to Apply The Security Patch in Your System? –
Try All-in-One Patch Manager Plus
Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces its…
Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券), a…
In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series of…
Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive ransomware,…
In a recent cyberattack attributed to the Qilin ransomware group, threat actors successfully compromised a…
A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic, governmental,…