40 million US T-Mobile customers hit by data breach

T-Mobile
A “highly sophisticated cyberattack” has stolen the information of 40 million T-Mobile customers in the US.

T-Mobile has announced that it had experienced a data breach, compromising the data of 40 million customers. The telecommunications provider described the breach as a “highly sophisticated cyberattack.” It said it is “taking immediate steps to help protect all individuals who may be at risk from this cyberattack”. It only identified the attack after online reports released last weekend of criminals attempting to sell a large database comprising T-Mobile customer information.

“Late last week, we were informed of claims made in an online forum that a bad actor had compromised T-Mobile systems,” it said.

“We immediately began an exhaustive investigation into these claims and brought in world-leading cybersecurity experts to help with our assessment.

“We then located and immediately closed the access point that we believe was used to illegally gain entry to our servers.”

T-Mobile has emphasised that the financial details of the customers were not leaked in the breach. It has identified that the following data was compromised:

  • 7.8 million current postpaid customer accounts’ information.
  • 40 million records of old and prospective customers. 
  • The names, phone numbers, account numbers and PINs of 850,000 active prepaid customers.

T-Mobile has said that it has reset all account PINs to protect those affected. It also emphasised that no phone numbers, account numbers, PINs, passwords, or financial information of prospective customers were compromised.

“We take our customers’ protection very seriously and we will continue to work around the clock on this forensic investigation to ensure we are taking care of our customers in light of this malicious attack,” the company said.

“While our investigation is ongoing, we wanted to share these initial findings even as we may learn additional facts through our investigation that cause the details above to change or evolve.”

READ MORE:

This is the second major attack on the network provider. Hackers previously stole the information of 15 million current and potential T-Mobile customers in 2015. It has yet to be confirmed if former T-Mobile customers in the UK have been included in the breach.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Why a data strategy underpins a successful AI strategy

Jim Liddle • 05th September 2024

AI and machine learning offer exciting innovation capabilities for businesses, from next-level predictive analytics to human-like conversational interfaces for functions such as customer service. But despite these tools’ undeniable potential many enterprises today are unprepared to fully leverage AI’s capabilities because they lack a prioritised data strategy. Bringing siloed and far-flung unstructured data repositories into...

Overcoming Inventory Challenges with Subscription Management Tools

Bluefort • 30th August 2024

Retailers face complex inventory management, especially with subscription models, which add extra challenges. This article explores these complexities, highlighting the pitfalls of manual processes and their costly inefficiencies. It also discusses how automation can simplify these challenges, turning them into opportunities for customer satisfaction and business growth.

The Power of the Subscription Model

Bluefort • 30th August 2024

The subscription model offers businesses a powerful strategy for sustainable growth by providing predictable revenue, fostering customer loyalty, and enabling flexibility to adapt to market changes. Companies like Adobe, Dollar Shave Club, and Porsche have demonstrated the success of this approach across various industries. By embracing subscriptions, businesses can build stronger customer relationships, increase Customer...

Streamlining Retail Administration with Subscription Management Solutions

Bluefort • 26th August 2024

Retailers encounter a distinctive set of challenges, operating in an intensely competitive industry where customer demand can fluctuate daily. In such an environment, stakeholders seek stability, and subscription-based models provide a solution by generating steady revenue and reducing administrative complexities. This article explores the most significant retail administrative challenges and demonstrates how a subscription management...

Streamlining Retail Administration with Subscription Management Solutions

Bluefort • 26th August 2024

Retailers encounter a distinctive set of challenges, operating in an intensely competitive industry where customer demand can fluctuate daily. In such an environment, stakeholders seek stability, and subscription-based models provide a solution by generating steady revenue and reducing administrative complexities. This article explores the most significant retail administrative challenges and demonstrates how a subscription management...

The CTO: From backroom to boardroom

Rohan Patel • 26th August 2024

Over the past decade, the tech industry has transformed at an astonishing rate, often leaving both consumers and businesses struggling to keep pace. At the forefront of this digital revolution is the Chief Technology Officer (CTO), whose responsibilities have evolved far beyond keeping up with tech trends. The role of the CTO has changed dramatically,...

The CTO: From backroom to boardroom

Rohan Patel • 26th August 2024

Over the past decade, the tech industry has transformed at an astonishing rate, often leaving both consumers and businesses struggling to keep pace. At the forefront of this digital revolution is the Chief Technology Officer (CTO), whose responsibilities have evolved far beyond keeping up with tech trends. The role of the CTO has changed dramatically,...
The Digital Transformation Expo is coming to London on October 2-3. Register now!