On Monday afternoon, the company confirmed to Threatpost that it has determined that there’s been unauthorized access to “some T-Mobile data,” though it didn’t answer questions about the scope of the breach. Specifically, they claim to have penetrated T-Mobile’s production, staging, and development servers two weeks ago, including an Oracle database server that held the customer data, according to what they told BleepingComputer.Īs proof of the theft, the threat actor shared with BleepingComputer a screenshot of an SSH connection to a production server running Oracle.Ġ81621 13:50 UPDATE: On Monday morning, T-Mobile told news outlets that it’s investigating the alleged data breach, which first came to light on an underground forum over the weekend. The seller’s offer doesn’t mention T-Mobile, but the seller told Motherboard and BleepingComputer that the source is in fact the telecommunication kingpin’s servers. “We did it to harm US infrastructure.”īinns is a US citizen who lives in Turkey and who sued the FBI, CIA and Department of Justice in 2020, alleging that he was tortured and harassed by the US and Turkish governments and is seeking to compel the USA to release documents regarding these activities under the Freedom of Information Act. The seller also told Alon Gal, CTO of cybercrime intelligence firm Hudson Rock, that this sucker-punch to US infrastructure was done in retaliation, as Gal tweeted on Sunday: “This breach was done to retaliate against the US for the kidnapping and torture of John Erin Binns (CIA Raven-1) in Germany by CIA and Turkish intelligence agents in 2019,” the threat actor told Gal. The seller told Motherboard – which first reported the news – that for now, they’re privately selling the rest. The collection is a subset of the purported 100 million records contained in stolen databases. A threat actor is selling what they claim to be 30 million T-Mobile customers’ Social Security and driver license numbers on an underground web forum.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |