At this time, T-Cellular’s CEO Mike Sievert stated that the hacker behind the service’s newest huge information breach brute pressured his manner by T-Cellular’s community after having access to testing environments.
The attacker couldn’t exfiltrate buyer monetary info, bank card info, debit or different cost info during the incident.
Nonetheless, T-Cellular says that he stole data belonging to 54.6 million current, former, or prospective customers, containing Social Safety numbers, cellphone numbers, names, addresses, dates of delivery, T-Cellular pay as you go PINs, and driver license/ID info.
“No ongoing threat to buyer information”
“Whereas we’re actively coordinating with legislation enforcement on a felony investigation, we’re unable to reveal too many particulars,” Sievert stated in a statement published earlier today.
“What we will share is that, in easiest phrases, the unhealthy actor leveraged their data of technical techniques, together with specialised instruments and capabilities, to realize entry to our testing environments after which used brute pressure assaults and different strategies to make their manner into different IT servers that included buyer information.”
Sievert added that, following an investigation supported by Mandiant safety specialists, the corporate closed the entry factors utilized by the hacker to breach T-Cellular’s community.
“We’re assured that there is no such thing as a ongoing threat to buyer information from this breach,” the US cellular service’s CEO added.
“There may be a lot work to do, and it will take time, and we stay dedicated to doing our greatest to make sure those that had info uncovered really feel knowledgeable, supported, and guarded by T-Cellular.”
That is the sixth main information breach T-Cellular publicly acknowledged up to now 4 years:
Hacker makes enjoyable of T-Cellular’s ‘terrible’ safety
John Erin Binns, a 21-year-old American now dwelling in Turkey, claims to be the one behind this huge breach based on a Wall Street Journal report from Thursday.
After hacking into their Washington state information middle, he purportedly gained entry to credentials for greater than 100 servers on T-Cellular’s community.
In line with Binns’ claims, the preliminary assault vector used to breach the T-Cellular community was an Web-exposed and unprotected router.
“Their safety is terrible,” the alleged attacker stated. “I used to be panicking as a result of I had entry to one thing massive.”
In his Telegram chat with the WSJ, Binns averted confirming if he was paid to hack into T-Cellular’s techniques or if he offered any of the stolen information to others.
As BleepingComputer reported nearly two weeks in the past, a risk actor was promoting what he claimed to be a database containing the personal info of roughly 100 million T-Mobile customers on a hacking discussion board.
He additionally stated the assault’s objective was to “retaliate in opposition to the US for the kidnapping and torture of John Erin Binns (CIA Raven-1) in Germany by CIA and Turkish intelligence brokers in 2019.”
Binns sued the FBI, CIA, and Department of Justice in 2020 for being tortured and harassed. He’s attempting to pressure the USA to launch paperwork exposing these actions underneath the Freedom of Info Act.
How one can defend your information and your T-Cellular account
Any risk actors who acquired their fingers on the data of T-Cellular clients stolen on this incident can use it in extremely harmful SIM swapping assaults that would enable them to take over victims’ on-line accounts and steal their id.
All probably affected clients ought to be looking out for suspicious emails or textual content messages pretending to come back from T-Cellular and never click on on any embedded hyperlinks in the event that they spot one to forestall having their credentials stolen.
T-Cellular encourages clients to take the next actions as quickly as attainable to guard their accounts:
- Set up Scam Shield: Faucet into our community’s superior scam-blocking safety and activate anti-scam options comparable to Rip-off Block and Caller ID.
Enable Account Takeover Protection: Use our free Account Takeover Safety service to assist defend in opposition to an unauthorized person fraudulently porting out and stealing your cellphone quantity (postpaid solely).
Check additional resources for extra methods to guard your self.
Replace: Added T-Mobile’s statement on Binns’ claims that he was the one behind the assault.