“We have no indication that the data contained in the stolen files included any customer financial information, credit card information, debit or other payment information,” it said. T-Mobile said it located and immediately closed the access point it believed was used to illegally gain entry to its servers, and while its investigation was still underway, it confirmed that the data stolen included some personal information. We immediately began an exhaustive investigation into these claims and brought in world-leading cybersecurity experts to help with our assessment.” “Late last week we were informed of claims made in an online forum that a bad actor had compromised T-Mobile systems. T-Mobile issued an update on its ongoing investigation into the breach, including estimations of individuals affected and remediation steps it was taking. Company takes steps to help protect individuals at risk from cyberattack Tuesday, August 17: T-Mobile says data breach affected approximately 7.8 million current customers and 40 million records of former or prospective customers. Until we have completed this assessment, we cannot confirm the reported number of records affected or the validity of statements made by others,” the statement read. “This investigation will take some time but we are working with the highest degree of urgency. The company said it was confident that the entry point used to gain access had been closed, and that it was continuing its deep technical review of the situation across systems to identify the nature of any data that was illegally accessed. We take the protection of our customers very seriously and we are conducting an extensive analysis alongside digital forensic experts to understand the validity of these claims, and we are coordinating with law enforcement.” “We have been working around the clock to investigate claims being made that T-Mobile data may have been illegally accessed. With news of the incident making headlines around the globe, T-Mobile issued a statement confirming that unauthorized access to some T-Mobile data had occurred, though investigations were yet to determine if any personal customer information was involved. Monday, August 16: T-Mobile confirms data breach and begins technical review of the incident We do not have any additional information to share at this time.” In a statement to Motherboard, T-Mobile said: “We are aware of claims made in an underground forum and have been actively investigating their validity. The seller was asking for 6 bitcoin (around $270,000) for a subset of the data containing 30 million SSNs and driver’s licenses and said that they were looking to sell the remaining information privately. Motherboard confirmed this to be accurate. While the underground forum post did not mention T-Mobile specifically, a message to Motherboard confirmed that the information came from T-Mobile servers and included SSNs, phone numbers, names, physical addresses, IMEI numbers, and driver’s license information. News broke on of hackers claiming to have accessed data relating to over 100 million people, which they were offering sale. T-Mobile breach timeline Sunday, August 15: Hackers claim to be selling 100 million stolen T-Mobile records on cybercrime forum CSO will update this timeline as events unfold. With the dust still very much settling, here is a timeline of the data breach according to T-Mobile’s public disclosure and other sources. While many details of the incident (including its root cause) remain unclear as of August 19, immediate fallout suggests this incident might be one of the most significant of recent times, not least due to the number of records exposed and potential regulatory implications that may come into play. Telecommunications giant T-Mobile has warned that information including names, dates of birth, US Social Security numbers (SSNs), and driver’s license/ID of some 50 million individuals comprising current, former, or prospective customers has been exposed via a data breach.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |