“We are currently in the process of informing impacted customers that after a thorough investigation we have determined that a bad actor used a single Application Programming Interface (or API) to obtain limited types of information on their accounts. As soon as our teams identified the issue, we shut it down within 24 hours. Our systems and policies prevented the most sensitive types of customer information from being accessed, and as a result, customer accounts and finances should not be put at risk directly by this event. There is also no evidence that the bad actor breached or compromised T-Mobile’s network or systems."
How Serious Was the Attack?
No passwords, payment card information, social security numbers, government ID numbers or other financial account information were compromised, T-Mobile said. Some basic customer information was obtained, nearly all of which is the type widely available in marketing databases or directories. The information included name, billing address, email, phone number, date of birth, account number, and information such as the number of lines on the account and service plan features.Further commenting, T-Mobile said:“We understand that an incident like this has an impact on our customers and regret that this occurred. While we, like any other company, are unfortunately not immune to this type of criminal activity, we plan to continue to make substantial, multi-year investments in strengthening our cybersecurity program."
Cyber Expert Adds Perspective
Commenting on the T-Mobile hack, Dirk Schrader, vice of Security Research for private IT security software provider Netwrix, described APIs as “highways to a company’s data” — highly automated and allowing access to large amounts of information.“As digitalization heavily relies on this kind of automated interaction using APIs, and time-to-market often trumps security, the risk related to unmonitored APIs is likely to grow even more,” Schrader said.
“Additionally, when there are no controls in place that monitor the amount of data left by the domain via the API, it results into no control over the customers’ data,” he said.
“Simply put, these actors merge data from several leaks, like the one that happened to Twitter recently, to come up with an even more convincing story for the upcoming phishing attack,” he said.