The mobile network operator Sprint disclosed a security breach, the company revealed that hackers compromised an unknown number of customer accounts via the Samsung.com “add a line” website.
“On June 22, Sprint was informed of unauthorized access to your Sprint account using your account credentials via the Samsung.com “add a line” website.” reads a letter sent to the customers by the company. “We take this matter, and all matters involving Sprint customer’s privacy, very seriously.”
The information exposed in the data breach includes the phone number, device type, device ID, monthly recurring charges, subscriber ID, account number, account creation date, eligibility, first and last name, billing address, and add-on services.
According to the company, exposed data don’t expose customers to a substantial risk of fraud or identity theft, but in my humble opinion, such kind of information could be used for several malicious purposes.
In response to the incident, on June 25 the mobile network operator reset PIN codes of its users.
The US telecommunications company did not reveal the number of affected customers.
Sprint recommends affected clients to take all the precautionary steps necessary to prevent identity theft and other fraudulent activities as recommended by the Federal Trade Commission (FTC):
“As a precautionary measure, we recommend that you take the preventative measures that are recommended by the Federal Trade Commission (FTC) to help protect you from fraud and identity theft.” concludes the letter. “These preventative measures are included at the end of this letter. You may review this information on the FTC’s website at www.ftc.gov/idtheft and www.IdentityTheft.govor contact the FTC directly by phone at 1-877-438-4338 or by mail at 600 Pennsylvania Avenue, NW, Washington, DC 20580.”
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Sprint, data breach)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.