Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Security Strategy, Plan, Budget, Threat Management, Threat Management, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

T-Mobile confirms hack but doubts crooks have the goods

T-Mobile has confirmed that hackers were able to swipe data from its systems, but the wireless carrier is downplaying the threat to customers.

Over the weekend, hackers posted a note to the Full Disclosure mailing list that appeared to contain files stolen from T-Mobile. In the note, the intruders said they were planning to sell the data to the highest bidder after attempts failed to sell it to T-Mobile's competitors.

The crooks claimed to be in possession of "(T-Mobile's) databases, confidential documents, scripts and programs from their servers [and] financial documents up to 2009."

"Regarding the recent claim on a web site, we've identified the document from which information was copied and believe possession of this alone is not enough to cause harm to our customers," a T-Mobile statement said. "We continue to investigate the matter and have taken additional precautionary measures to further ensure our customers' information and our systems are protected.

"At this moment, we are unable to disclose additional information in order to protect the integrity of the investigation, but customers can be assured that if there is any evidence that customer information has been compromised, we would inform those affected as quickly as possible."

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.