T-Mobile Confirms Lapsus$ Gang Breach

Share post:

T-Mobile has confirmed earlier reports by investigative journalist Brian Krebs that the Lapsus $extortion gang had infiltrated its network.

According to the telecoms giant, the breach took place “several weeks ago” and the attackers used stolen login credentials to gain access to internal systems.

T-Mobile said the attackers did not steal customer or government information during the attack. The company was able to cut off the attacker’s access to its network and disable the credentials after discovering the breach.

According to Brian Krebs, who first reported the breach, the cybercriminals stole proprietary T-Mobile source code during the attack.

The breach means T-Mobile has suffered seven privacy breaches since 2018.

In December 2020, hackers gained access to customer network information such as phone numbers and call records. In 2021, an internal T-Mobile application was accessed by attackers without authorization.

The sources for this piece include an article in BleepingComputer.



Related articles

Microsoft announces enhanced security feature for OneNote

Microsoft has released further information on the increased security measures it is deploying for OneNote in order to...

Russian hacker group steals Emails of NATO officials and diplomats

Since February 2023, a Russian hacking gang known as TA473 or 'Winter Vivern' has targeted unpatched Zimbra endpoints...

Canadian cybersecurity accelerator counts its accomplishments

A Canadian university-associated business accelerator for helping early-stage cybersecurity companies says its first two years of operation have been more than satisfactory. The Rogers Cybersecure Catalyst Accelerator has had “an incredible impact” on Canadian cybersecurity entrepreneurs and founders, executive director Charles Finlay said this week in the first report on the program’s progress. Despite having

Crackdown on ransomware gangs yet to show an impact: OpenText

In its annual cybersecurity report OpenText also looked at malware, phishing and infec

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways