40 million US T-Mobile customers hit by data breach

T-Mobile
A “highly sophisticated cyberattack” has stolen the information of 40 million T-Mobile customers in the US.

T-Mobile has announced that it had experienced a data breach, compromising the data of 40 million customers. The telecommunications provider described the breach as a “highly sophisticated cyberattack.” It said it is “taking immediate steps to help protect all individuals who may be at risk from this cyberattack”. It only identified the attack after online reports released last weekend of criminals attempting to sell a large database comprising T-Mobile customer information.

“Late last week, we were informed of claims made in an online forum that a bad actor had compromised T-Mobile systems,” it said.

“We immediately began an exhaustive investigation into these claims and brought in world-leading cybersecurity experts to help with our assessment.

“We then located and immediately closed the access point that we believe was used to illegally gain entry to our servers.”

T-Mobile has emphasised that the financial details of the customers were not leaked in the breach. It has identified that the following data was compromised:

  • 7.8 million current postpaid customer accounts’ information.
  • 40 million records of old and prospective customers. 
  • The names, phone numbers, account numbers and PINs of 850,000 active prepaid customers.

T-Mobile has said that it has reset all account PINs to protect those affected. It also emphasised that no phone numbers, account numbers, PINs, passwords, or financial information of prospective customers were compromised.

“We take our customers’ protection very seriously and we will continue to work around the clock on this forensic investigation to ensure we are taking care of our customers in light of this malicious attack,” the company said.

“While our investigation is ongoing, we wanted to share these initial findings even as we may learn additional facts through our investigation that cause the details above to change or evolve.”

READ MORE:

This is the second major attack on the network provider. Hackers previously stole the information of 15 million current and potential T-Mobile customers in 2015. It has yet to be confirmed if former T-Mobile customers in the UK have been included in the breach.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.