Tuesday, April 29, 2025
HomeData BreachT-Mobile Hacked - Attackers Stolen 2 Million Customers Sensitive Data

T-Mobile Hacked – Attackers Stolen 2 Million Customers Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

American Telecom giant T-Mobile suffering Massive data breach and hackers stolen around 2 million customers sensitive data.

T-Mobile is one of the best United States-based wireless network operator that provides wireless voice and data services in the United States.

A cybersecurity Team from T-Mobile learned that an unauthorized access on their network and they have shut down an uncovered data unit.

- Advertisement - Google News

Hackers have stolen some of the sensitive information including the name, billing zip code, phone number, email address, account number, and account type of users.

T-Mobile reported that None of the customer’s financial data (including credit card information) or social security numbers were involved, and no passwords were compromised.

2 Millions of T-Millions customers are around  3 percent of T-Mobile’s 77 million customers may have been affected in this data breach.

The spokesperson from T-Mobile Said that the “incident” happened “early in the morning on Aug. 20,” when hackers part of “an international group” accessed company servers through an API that “didn’t contain any financial data or other very sensitive data.”

The company wrote in the announcement that “all affected customers have been, or shortly will be, notified.

If you don’t receive a notification then that means your account was not among those impacted by this incident.” T-Mobile also requested customers to contact customer service through 611 if they were concerned.

“T-Mobile customer also use two-way messaging on MyT-Mobile.com, the T-Mobile App, or iMessage through Apple Business Chat.”

Also Read

Spyware Company Exposed Terabytes of Sensitive Images, Audio Recordings, and Web History Online

World’s Largest Web Hoster GoDaddy Exposed Massive Amount Of Sensitive Data Online

Reddit Data Breach – Hackers Stolen Users’ Email Address and Credentials

10 million Customers Personal Records Leaked in Dixons Carphone Massive Data Breach

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...

ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks

A previously undocumented remote access trojan (RAT) named ResolverRAT has surfaced, specifically targeting healthcare...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Massive Attack: 4,800+ IPs Used to Target Git Configuration Files

A recent surge in cyber reconnaissance has put thousands of organizations at risk after...

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

Hackers Claim TikTok Breach, Leak Over 900,000 Usernames and Passwords

A hacker collective known as R00TK1T claims to have breached TikTok's user database, allegedly...