T-Mobile Cyber Attack Exposed Personal Data of More Than 54 Million Customers

By

T-Mobile's third major customer data leak in two years resulted in the exposure of personal information of more than 54 million of the company's customers. The American hacker who is claiming responsibility for the attack told the Wall Street Journal that T-Mobile's "awful" security helped him gain access to millions of customer records.

John Binns, who currently resides in Turkey, said he broke into T-Mobile's servers around August 4. He said he breached the company's network after discovering an unprotected router, which he used to access T-Mobile's data center in Washington state. He was able to access everything from birthdays to social security numbers through the breach, including customers' unique phone-linked IMEI and IMSI numbers.

Last week T-Mobile said their investigation into the breach with the FCC is ongoing, but that the company is confident it has closed off the access point used in the attack. T-Mobile is offering two years of free identity protection services through McAfee's ID Theft Protection Service to those impacted by the breach.

"As we support our customers, we have worked diligently to enhance security across our platforms and are collaborating with industry-leading experts to understand additional immediate and longer-term next steps," said the company in a statement. "We also remain committed to transparency as this investigation continues and will continue to provide updates if new information becomes available that impacts those affected or causes the details above to change or evolve."

The breach highlights the precarious position of many large and well-known companies vulnerable to network data breaches. In May, President Biden signed  a cybersecurity executive order focused on beefing up U.S. cyber protections, threat intelligence sharing and cyberattack response efforts. It specifically focuses on IT service providers, MSPs and MSSPs that work with the U.S. federal government.

T-Mobile has undergone six additional data breaches in the past four years.




Edited by Luke Bellos
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

TechZone360 Contributing Editor

SHARE THIS ARTICLE
Related Articles

Phishing bank scams in Australia: How to protect your business

By: Contributing Writer    9/28/2023

Financial phishing scams, a prevalent form of bank scams in Australia, have plagued Australians for years, leading to significant financial and emotio…

Read More

EDR: The Missing Piece in Your Security Puzzle

By: Contributing Writer    9/28/2023

Endpoint Detection and Response (EDR) is a cybersecurity technology that continuously monitors and responds to various threats to an organization's ne…

Read More

What Is SAST and How It Can Help DevSecOps Adoption

By: Contributing Writer    9/28/2023

With the rise of cyber-attacks and high-profile data breaches, companies are increasingly recognizing the need to integrate security into every phase …

Read More

Unmasking the Power of Brand Reputation: How it Can Make or Break Your Business

By: Contributing Writer    9/27/2023

A business's brand reputation can either make or break the business. It's a powerful concept that can influence customers, attract new clients, and in…

Read More

CI/CD Tools: A Beginner's Guide

By: Contributing Writer    9/27/2023

In the fast-paced landscape of modern software development, the tools and practices you choose can make or break the efficiency of your development pi…

Read More