T-Mobile has confirmed it was targeted in a recent wave of cyberattacks against U.S. telecommunications companies, believed to be carried out by the Chinese state-sponsored hacking group Salt Typhoon. The attackers gained unauthorized access to sensitive data, including private communications, call records, and law enforcement information requests. However, T-Mobile stated that its systems and customer data were not significantly impacted. The company confirmed there is no evidence of data exfiltration or compromise of customer information. “We have no indication that customer or sensitive information has been accessed or exfiltrated,” T-Mobile said in a statement, emphasizing its robust security controls and vigilant monitoring. The company is actively working with industry peers and authorities to address potential risks. Salt Typhoon has targeted U.S. telecoms in the past, focusing on breaching government entities and high-level officials. This breach was part of a broader campaign aimed at stealing communications, including call logs and text messages from senior U.S. national security officials. The FBI and CISA have confirmed that the attackers exfiltrated sensitive communications and law enforcement data. The attacks reportedly exploited vulnerabilities in Cisco routers, although Cisco has denied that its equipment was breached. This breach is the ninth security incident T-Mobile has faced since 2019, adding to its history of data breaches involving customer and employee information. T-Mobile reassured customers that it continues to monitor the situation closely and is committed to securing its systems.
Hackers are exploiting fake CAPTCHA pages to trick users into sending large volumes of international SMS messages, turning routine “prove you’re human” checks into a profitab...
A critical vulnerability has been identified in the Breeze Cache plugin for WordPress, actively exploited by attackers to upload arbitrary files without authentication. Tracked as ...
UNC6692 is a threat cluster conducting targeted social engineering campaigns by impersonating IT helpdesk staff through Microsoft Teams. Instead of exploiting software vulnerabilit...