• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

API Attacker Steals Data on 37 Million T-Mobile Customers

You are here: Home / General Cyber Security News / API Attacker Steals Data on 37 Million T-Mobile Customers
January 20, 2023

T-Cell has admitted that tens of millions of buyers experienced their particular and account information accessed by a destructive actor by way of an API.

The US mobile provider explained in an SEC submitting yesterday that the attack commenced “on or around” November 25 2022, but was not found right until January 5 2023, right after which time T-Cell contained and remediated the incident in a day.

Between the details compromised by the threat actor were being shopper names, billing and email addresses, phone figures, dates of delivery, T-Cell account numbers and information and facts these as the number of traces on the account and plan attributes.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


T-Mobile sought to participate in down the seriousness of the breach in a related statement, saying that “nearly all” of the details stolen “is the form greatly offered in marketing databases or directories.”

That misses the stage a little in that large troves of knowledge like this present a readymade profile on every single customer for scammers to use in comply with-on phishing and id fraud tries.

“No passwords, payment card info, social security numbers, authorities ID numbers or other fiscal account facts were being compromised,” T-Cellular added in its assertion.

“Our systems and policies prevented the most sensitive forms of customer information and facts from getting accessed, and as a end result, consumer accounts and funds really should not be place at risk immediately by this party. There is also no evidence that the poor actor breached or compromised T-Mobile’s network or units.”

It is unclear particularly what sort of API flaw was exploited by the risk actors, or why it took almost a month and a half for the carrier to detect the breach.

Ivan Novikov, CEO and co-founder of Wallarm, argued that corporations need to regularly evaluate and update their security techniques, policies and capabilities, and have incident reaction plans in location.

“As organizations continue to accelerate their electronic transformation initiatives and leverage far more and a lot more APIs, it is important that they have the correct instruments and skills in area to safeguard their delicate information,” he additional.

“Unauthorized entry as a result of a single API can guide to a significant data breach.”

Editorial credit score icon image: nikkimeel / Shutterstock.com


Some elements of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Massive Credential Stuffing Campaign Hits 35,000 PayPal Users

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • API Attacker Steals Data on 37 Million T-Mobile Customers
  • Massive Credential Stuffing Campaign Hits 35,000 PayPal Users
  • New Chinese Malware Spotted Exploiting Recent Fortinet Firewall Vulnerability
  • Roaming Mantis’ Hacking Campaign Adds DNS Changer to Mobile App
  • ThreatModeler Makes DevSecOps More Accessible With New Marketplace
  • Mailchimp Hit By Another Data Breach Following Employee Hack
  • New Microsoft Azure Vulnerability Uncovered — Experts Warn of RCE Attacks
  • Ransomware Payments Fall by 40% in 2022
  • Android Users Beware: New Hook Malware with RAT Capabilities Emerges
  • New Research Delves into the World of Malicious LNK Files and Hackers Behind Them

Copyright © TheCyberSecurity.News, All Rights Reserved.