T-Mobile recently confirmed another hack, the second this year and ninth since 2018, revealing customer data and account PINs.
While T-Mobile confirmed a recent system detection that revealed a threat actor had accessed a small number of accounts, which compromised limited information.
836 customers were affected by the intrusion, which commenced on February 24 and continued till March 30.
Once T-Mobile discovered the breach on March 27, they reset customers’ account PINs to swap SIM cards and authorize critical account changes.
Here below, we have mentioned the types of data involve:-
T-Mobile’s security measures worked as intended in March 2023, alerting them to unauthorized activity.
During late February through March 2023, a threat actor gained access to restricted data from a few T-Mobile accounts, as revealed by their security system.
This year’s second T-Mobile hack is the ninth security breach since 2018, and in January, the misuse of T-Mobile’s application programming enabled threat actors to access 37 million customers’ data.
Despite having several safeguards to prevent unauthorized access, T-Mobile acknowledges the need to enhance its security measures continually.
They take such incidents seriously, apologize for the breach, and are working towards improving the security of customers’ information.
T-Mobile reset their customers’ T-Mobile Account PIN to safeguard their accounts. Additionally, they provide free identity theft detection services and credit monitoring for two years through Transunion’s myTrueIdentity.
Moreover, T-Mobile conducts a thorough investigation to understand unauthorized activity and improve its safeguards to prevent such incidents from happening again.
Here below, we have mentioned all the recommendations offered by T-Mobile:-
Struggling to Apply The Security Patch in Your System? –
Try All-in-One Patch Manager Plus
The United States government has issued a stark warning about a new wave of social engineering attacks orchestrated by North…
Cisco has disclosed multiple vulnerabilities in its IP Phone firmware that could severely impact users by allowing unauthenticated, remote attackers…
APT actors and cybercriminals both exploit proxy anonymization layers and VPN nodes to mask their malicious activities, while Pawn Storm,…
Security researchers at FortiGuard Labs discovered a new botnet in April that exploits a weakness in D-Link devices. Dubbed "Goldoon,"…
LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series A funding led by Glilot+, the…
Hackers use deep fake AI photos to impersonate individuals online, allowing them to deceive, manipulate, or gain unauthorized access to…