backtop


Print 16 comment(s) - last by johnfranks999.. on Jun 10 at 2:55 PM

T-Mobile's servers have been compromised, but unsure of how much damage was caused

T-Mobile has confirmed it recently suffered a data breach in which hackers compromised the company's servers and reportedly copied customer information.

An anonymous post published on the Full Disclosure security mailing list with the following message:  "We have everything -- their databases, confidential documents, scripts and programs from their servers, financial documents up to 2009," according to the Full Disclosure post.

The poster offered the information to T-Mobile competitors, who weren't interested in the information, and is now willing to sell it to the highest bidder available.

"We already contacted with their competitors and they didn't show interest in buying their data -- probably because the mails got to the wrong people -- so now we are offering them for the highest bidder," the post claims.

T-Mobile is looking into the matter to try and identify whether or not the hacker actually walked away with information that can be sold to a T-Mobile competitor.

"We've identified the document from which information was copied, and believe possession of this alone is not enough to cause harm to our customers," T-Mobile said in a statement.  "Customers can be assured if there is any evidence that customer information has been compromised, we would inform those affected as quickly as possible."

Some security experts have come forward to say they believe the post on the Full Disclosure forum is nothing more than a hoax, saying it's unlikely someone would go through the trouble of compromising T-Mobile's servers to gain information without a buyer already identified.

At least one security expert said that even though companies routinely have their databases breached with information taken, it's rare that the people responsible publicly discuss the matter.  Security experts and analysts are curious to learn how serious the data breach was, and if any T-Mobile subscribers face possible identity theft because of the intrusion.



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

Who's in Your Fav Five?
By Teancum on 6/9/2009 2:27:19 PM , Rating: 2
Will there soon be a witty commercial spinning this?




By Brandon Hill (blog) on 6/9/2009 2:29:23 PM , Rating: 5
IDK my bff Jill?


RE: Who's in Your Fav Five?
By captainpierce on 6/9/2009 2:32:02 PM , Rating: 5
quote:
Will there soon be a witty commercial spinning this?


Wit is not needed. Just the body of Catherine Zeta.


RE: Who's in Your Fav Five?
By AlvinCool on 6/9/2009 3:33:07 PM , Rating: 3
quote:
Wit is not needed. Just the body of Catherine Zeta.


Yea we are switching from Sprint to Verizon and our rep thats giving us our mobile makeover looks more like Cloris Leachman


RE: Who's in Your Fav Five?
By Teancum on 6/9/2009 3:36:40 PM , Rating: 5
She is looking good for 40.


RE: Who's in Your Fav Five?
By mezman on 6/9/2009 6:06:28 PM , Rating: 2
I'd say she's looking good for any age. Yowza!


RE: Who's in Your Fav Five?
By stubeck on 6/9/2009 7:49:35 PM , Rating: 1
I think you need to complement her cosmetic surgeon.


By therealnickdanger on 6/10/2009 7:39:28 AM , Rating: 3
Whoever is responsible, I'd like to thank him. I think I just breached my pants.


RE: Who's in Your Fav Five?
By callmeroy on 6/10/2009 8:20:00 AM , Rating: 1
I never understood those comments.....when someone goes "wow she looks great" and all someone else says is "..thanks to her cosmetic surgery"......my thought is "So." If the topic is about solely how someone looks and if they look good and did have surgery to get that way -- good for them, if you didn't know before someone told you it must of been pretty damn good work so what's the point?

Now the strange thing about my comment --- I myself , unless disfigured in an accident or some crime -- God forbid, i'd never get cosmetic surgery myself I think its a sign of insecurity and vanity.

Anyway....yep -- she looks good...too bad the phone company itself --- sucks. Oh wait maybe she does too.....let me give Michael Douglas a call and ask him..... ;)


RE: Who's in Your Fav Five?
By PhoenixKnight on 6/9/2009 3:37:07 PM , Rating: 5
I'd breach her data any day.


Stupid
By DigitalFreak on 6/9/2009 3:25:11 PM , Rating: 2
quote:
"We already contacted with their competitors and they didn't show interest in buying their data -- probably because the mails got to the wrong people -- so now we are offering them for the highest bidder," the post claims.


Wrong people? Yeah, right. Like any of its competitors would touch that with a 10ft pole.




hint of overseas
By tastyratz on 6/9/2009 10:49:59 PM , Rating: 2
quote:
We already contacted with their competitors

quote:
the mails got to the wrong people

I can has your data's?




By johnfranks999 on 6/10/2009 2:55:12 PM , Rating: 2
In the realm of risk, unmanaged possibilities become probabilities: These data breaches and thefts are due to a lagging business culture. As CIO, I'm always looking for ways to help my team, business teams, and ad hoc measures of various vendors, contractors and internal team members. A book that is required reading (specific chapters, depending on nature of projects) is "I.T. Wars: Managing the Business-Technology Weave in the New Millennium." It has a great chapter regarding security (among others).

We keep a few copies kicking around - it would be a bit much to expect outside agencies to purchase it on our say-so. But, particularly when entertaining bids for projects, we ask potential solutions partners to review relevant parts of the book, and it ensures that these agencies understand our values and practices.

The author, David Scott, has an interview here that is a great exposure: http://businessforum.com/DScott_02.html

The book came to us as a tip from one of our interns who attended a course at University of Wisconsin, where the book is in use; I like to pass along things that work, in the hope that good ideas continue to make their way to me. I hope you can make use of this info...




EXPERTZ LOL
By icanhascpu on 6/9/09, Rating: -1
RE: EXPERTZ LOL
By Spivonious on 6/9/2009 3:43:41 PM , Rating: 2
Veuge? I assume you meant vague?


"We can't expect users to use common sense. That would eliminate the need for all sorts of legislation, committees, oversight and lawyers." -- Christopher Jennings











botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki