T-Mobile Probes Attack, Confirms Systems Were Breached



Whether that is the route that compromised T-Mobile remains to be seen. It may be possible to hack into a GGSN router, but it's extremely unlikely that access could be parlayed into reaching all of the T-Mobile databases containing customer data, says Gene Yoo, CEO of Resecurity®. Also, there are no email addresses in the data.

Another handle wrapped up in the T-Mobile situation is @Intelsecrets. Lyashevesky claims to ISMG that @Intelsecrets is the person who actually hacked T-Mobile. The @und0xxed Twitter profile humorously lists @Intelsecrets as a co-defendant... Please continue the article at the source


Keep up to date with the latest cybersecurity news and developments.

By subscribing, I understand and agree that my personal data will be collected and processed according to the Privacy and Cookies Policy

Cloud Architecture
Cloud Architecture
445 S. Figueroa Street
Los Angeles, CA 90071
Google Maps
Contact us by filling out the form.
Try Resecurity products today with a free trial