Saturday, May 24, 2025
HomeCyber AttackT-Mobile Hacked - Hackers Gained Access to Prepaid Customers Data

T-Mobile Hacked – Hackers Gained Access to Prepaid Customers Data

Published on

SIEM as a Service

Follow Us on Google News

American telecommunications giant T-Mobile Anoununced a data breach on its network, through which attackers gained access to a prepaid customer’s data.

T-Mobile US provides wireless voice, messaging, and data services in the United States. The company operates the third largest wireless network in the U.S market with over 84.2 million customers and annual revenues of $32 billion.

Cyber Criminals targeting the undisclosed number of T-Mobile prepaid wireless customers account.

- Advertisement - Google News

There is no financial data involved with this data breach, including social security numbers, and no passwords were compromised.

T-mobile believes that the following set of data may have been accessed by cybercriminals.

  • prepaid service account
  • Name 
  • Billing address (If the customer added when the account was created)
  • Phone number
  • Account number
  • Rate plan and features
  • International calling feature

“Rate plan and features of your voice calling service are “customer proprietary network information” (“CPNI”) under FCC rules, which require we provide you notice of this incident.”

According to the T-Mobile statement ” We take the security of your information very seriously and have a number of safeguards in place to protect your personal information from unauthorized access. We truly regret that this incident occurred and apologize for any inconvenience this has caused you.”

This is not the first time T-Mobile facing the data breach, Last year August hackers gained access to their internal network and stolen around 2 million customers’ sensitive data. 

If you were a Prepaid T-Mobile customer, and did not receive a notification and would like to confirm if your information was impacted, T-Mobiel requests their customers to email privacy@t-mobile.com.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

Data Breach – How Badly It Affect Your Business – Top 3 Negative Impact

Prepare Your Business For a Security Breach – Risks and Protection Measures

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

EU Targets Stark Industries in Cyberattack Sanctions Crackdown

The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats,...

Venice.ai’s Unrestricted Access Sparks Concerns Over AI-Driven Cyber Threats

Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself...

Hackers Expose 184 Million User Passwords via Open Directory

A major cybersecurity incident has come to light after researcher Jeremiah Fowler discovered a...