Tuesday, March 19, 2024

T-Mobile Hacked – Attackers Stolen 2 Million Customers Sensitive Data

American Telecom giant T-Mobile suffering Massive data breach and hackers stolen around 2 million customers sensitive data.

T-Mobile is one of the best United States-based wireless network operator that provides wireless voice and data services in the United States.

A cybersecurity Team from T-Mobile learned that an unauthorized access on their network and they have shut down an uncovered data unit.

Hackers have stolen some of the sensitive information including the name, billing zip code, phone number, email address, account number, and account type of users.

T-Mobile reported that None of the customer’s financial data (including credit card information) or social security numbers were involved, and no passwords were compromised.

2 Millions of T-Millions customers are around  3 percent of T-Mobile’s 77 million customers may have been affected in this data breach.

The spokesperson from T-Mobile Said that the “incident” happened “early in the morning on Aug. 20,” when hackers part of “an international group” accessed company servers through an API that “didn’t contain any financial data or other very sensitive data.”

The company wrote in the announcement that “all affected customers have been, or shortly will be, notified.

If you don’t receive a notification then that means your account was not among those impacted by this incident.” T-Mobile also requested customers to contact customer service through 611 if they were concerned.

“T-Mobile customer also use two-way messaging on MyT-Mobile.com, the T-Mobile App, or iMessage through Apple Business Chat.”

Also Read

Spyware Company Exposed Terabytes of Sensitive Images, Audio Recordings, and Web History Online

World’s Largest Web Hoster GoDaddy Exposed Massive Amount Of Sensitive Data Online

Reddit Data Breach – Hackers Stolen Users’ Email Address and Credentials

10 million Customers Personal Records Leaked in Dixons Carphone Massive Data Breach

Website

Latest articles

Beware Of Free wedding Invite WhatsApp Scam That Steal Sensitive Data

The ongoing "free wedding invite" scam is one of several innovative campaigns aimed at...

Hackers Using Weaponized SVG Files in Cyber Attacks

Cybercriminals have repurposed Scalable Vector Graphics (SVG) files to deliver malware, a technique that...

New Acoustic Keyboard Side Channel Attack Let Attackers Steal Sensitive Data

In recent years, personal data security has surged in importance due to digital device...

Discontinued WordPress Plugin Flaw Exposes Websites to Cyber Attacks

A critical vulnerability was discovered in two plugins developed by miniOrange.The affected plugins,...

ShadowSyndicate Hackers Exploiting Aiohttp Vulnerability To Access Sensitive Data

A new Aiohttp vulnerability has been discovered, which the threat actor ShadowSyndicate exploits.Aiohttp...

Hackers Launching AI-Powered Cyber Attacks to Steal Billions

INTERPOL's latest assessment on global financial fraud uncovers the sophisticated evolution of cybercrime, fueled...

Fujitsu Hacked – Attackers Infected The Company Computers with Malware

Fujitsu Limited announced the discovery of malware on several of its operational computers, raising...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles