Incidents

Massive data breach affects millions of T-Mobile customers; information for sale on dark web

Security teams at telecommunications firm T-Mobile are investigating a data breach after a hacker appeared claiming he has access to the records of some 100 million customers. The investigation began after the company was alerted to a dark web post offering the information for sale in exchange for 6 Bitcoin.

Although the seller does not specify in his post how he obtained this data, an investigator managed to contact him and was able to learn that the information was extracted during an incident of attack on T-Mobile’s servers.  


The vendor claims that the production, preparation and development servers were compromised a couple of weeks ago, plus the leak includes full names, phone numbers, dates of birth, social security numbers, IMSI and IMEI keys and other sensitive details.

The vendor shared some screenshots of an SSH connection to a compromised production server to demonstrate the legitimacy of the incident.


Members of the cybersecurity community have analyzed the leak and concluded that this information actually belongs to T-Mobile customers. Moreover, cybersecurity firm Cyble points out that the actors behind the attack could also have stolen some additional databases from the affected systems.

Finally, investigators at the Hudson Rock firm claim to have contacted the hacker responsible for the incident, who mentioned that the main motivation for the attack was to retaliate against the U.S. government for the kidnapping and torture of John Erin Binns. This man is a resident of Turkey who decided to sue the Federal Bureau of Investigation (FBI) and the Central Intelligence Agency (CIA) accusing agents of both organizations of torturing him with political motivations. “The main intention is to harm the U.S. government,” the hackers claimed.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.


To Top

Pin It on Pinterest

Share This