T-Mobile data breach affects more than a million users

The company has given no indication as to whether any personal information has been stolen

T-Mobile confirmed over the weekend that data belonging to over one million of its customers has been exposed following a system breach.

Personal information was accessed including names, billing addresses, phone numbers, account numbers, rate plan and features. Financial data such as credit card numbers, social security numbers and passwords are believed to be unaffected.

The company said all affected individuals have been, or will shortly be, notified, adding that customers should check they have up-to-date contact details on their account in the event the company needs to reach them.

T-Mobile confirmed to TechCrunch that less than 1.5% of its customers were affected, amounting to more than one million of the 75 million customers the company currently services.

"T-Mobile, like any other corporation, is unfortunately not immune to this type of criminal attack. Because of that, we are always working to improve security so we can stay ahead of malicious activity and protect our customers," said the company in a fairly brief disclosure notice. 

"We have a number of safeguards in place to protect your personal information from unauthorised access, use, or disclosure," it added.

T-Mobile hasn't disclosed how the breach took place, whether data was stolen or how long the data was exposed for, but it did say it was fixed "promptly" after it took place in early November and that the relevant authorities have since been alerted.

The data accessed isn't inherently high-risk for the user given that passwords and financial information were not accessed, however if any data was taken, it's important that customers be on the look out for sophisticated phishing scams.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
IT services giant Sopra Steria falls victim to Ryuk ransomware
Security

IT services giant Sopra Steria falls victim to Ryuk ransomware

23 Oct 2020
How to wipe a laptop easily and securely
Security

How to wipe a laptop easily and securely

5 Oct 2020