The wireless carrier T-Mobile was victims of a sophisticated cyber attack that targeted its email vendor.
A data breach notification published by the telecommunications giant on its website revealed that the security breach impacted both employees and customers.
“Our Cybersecurity team recently identified and shut down a malicious attack against our email vendor that led to unauthorized access to certain T-Mobile employee email accounts, some of which contained account information for T-Mobile customers and employees.” reads the data breach notification.
The company has immediately launched an investigation with the help of leading forensics experts, it already reported the incident to federal law enforcement.
Exposed data included customer names and addresses, phone numbers, account numbers, rate plans and features, and billing information, fortunately, financial information (including credit card data) and Social Security number were not impacted.
T-Mobile confirmed that some of these accounts accessed by the hackers contained account information for its customers and employees.
The company declared that it is not aware of abuses of the exposed information.
“We are not aware of any evidence where the information contained in the affected email accounts has been used to commit fraud or otherwise misused.” continues the notice.
Customers who believe they might have been impacted by the data breach could contact Customer Care for additional information and assistance.
T-Mobile was able to identify the intrusion and shut down the unauthorized access.
At the time of writing the company did not provide details on the attack, including the timeframe for it took place and the number of impacted customers.
In November 2019, the US branch of the telecommunications giant disclosed another security breach that according to the company impacted a small number of customers of its prepaid service.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, T-mobile)
[adrotate banner=”5″]
[adrotate banner=”13″]
Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…
A Chinese threat actor, tracked as UAT-6382, exploited a patched Trimble Cityworks flaw to deploy…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Samsung MagicINFO 9 Server vulnerability to its…
Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…
Microsoft found 394,000 Windows systems talking to Lumma stealer controllers, a victim pool that included…
CISA warns Russia-linked group APT28 is targeting Western logistics and tech firms aiding Ukraine, posing…
This website uses cookies.