Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I own a small car dealership and I encrypt all of my customer's data at rest. I could hand my database to a hacker with next to nothing compromised. You'd need to dump my database and steal the secret in memory key.

In 2021 these billion dollar companies need to be held accountable. Unacceptable.
At rest encryption and what it protects you from is often misunderstood, and it seems to be here as well.

That's fine for a small database that probably lives on the same computer you access it from, and is offline except when being accessed by a small number of people. It probably protects you from a great deal of scenarios so long as the key to decrypt it is only entered while the database is opened, like File Vault encryption on your Mac.

However, most large companies and apps databases are rarely *at rest*. If I wanted to compromise Mac Rumors for example, odds are good I wouldn't go directly for their database. I'd attack the web app, and if I could inject a shell into the web app, I could use the web app's credentials to the online, not at rest database, and dump every piece of data the always online forum app had access to. It is very likely this is much closer to how this data was accessed than someone simply copying all the at rest files off a database server.

Because of this fundamental problem, I think the real lesson from this hack is simple: *why* do we think it's acceptable for phone companies to even *have* this much info about their customers? They don't need my SSN, my driver's license, or my birthday to give me a phone number.
 
  • Like
Reactions: deeddawg
Yeah I really don't like the SSN setup going on. Not sure why that became the ONE NUMBER to identify you and a lot of places asks for it.
This question is impossible to answer without veering off-topic into politics. The unfortunate truth is that our society is f***** in ways that are both known and completely avoidable. A 9 digit non-random, immutable number being a primary form of identification being one of them. On a technical level, encryption could be used for secure identity verification with minimal risk of leaking credentials.
 
Yeah I really don't like the SSN setup going on. Not sure why that became the ONE NUMBER to identify you and a lot of places asks for it.
Prolly because they don’t want to implement an actually safe system to identity people because, MURICA AND FREEDOM. /s
One can only hope they are not hacker’s target of choice since SSN can’t be changed.
 
They *claim* everything is okay:

1F03ED7D-394B-4390-B557-E201F617CA2E.jpeg
 
"Motherboard said that it was provided with some samples of data and was able to confirm that they contained accurate information on T-Mobile customers."

uh ok law enforcement, gets the info as its their job,
 
Krebs has some more info on his blog
We have determined that unauthorized access to some T-Mobile data occurred, however we have not yet determined that there is any personal customer data involved,” T-Mobile wrote.

“We are confident that the entry point used to gain access has been closed, and we are continuing our deep technical review of the situation across our systems to identify the nature of any data that was illegally accessed,” the statement continued. “This investigation will take some time but we are working with the highest degree of urgency. Until we have completed this assessment we cannot confirm the reported number of records affected or the validity of statements made by others.”

The intrusion came to light on Twitter when the account @und0xxed started tweeting the details. Reached via direct message, Und0xxed said they were not involved in stealing the databases but was instead in charge of finding buyers for the stolen T-Mobile customer data.

Und0xxed said the hackers found an opening in T-Mobile’s wireless data network that allowed access to two of T-Mobile’s customer data centers. From there, the intruders were able to dump a number of customer databases totaling more than 100 gigabytes.

They claim one of those databases holds the name, date of birth, SSN, drivers license information, plaintext security PIN, address and phone number of 36 million T-Mobile customers in the United States — all going back to the mid-1990s.

The hacker(s) claim the purloined data also includes IMSI and IMEI data for 36 million customers. These are unique numbers embedded in customer mobile devices that identify the device and the SIM card that ties that customer’s device to a telephone number.

“If you want to verify that I have access to the data/the data is real, just give me a T-Mobile number and I’ll run a lookup for you and return the IMEI and IMSI of the phone currently attached to the number and any other details,” @und0xxed said. “All T-Mobile USA prepaid and postpaid customers are affected; Sprint and the other telecoms that T-Mobile owns are unaffected.”

Other databases allegedly accessed by the intruders included one for prepaid accounts, which had far fewer details about customers.

“Prepaid customers usually are just phone number and IMEI and IMSI,” Und0xxed said. “Also, the collection of databases includes historical entries, and many phone numbers have 10 or 20 IMEIs attached to them over the years, and the service dates are provided. There’s also a database that includes credit card numbers with six digits of the cards obfuscated.”

T-Mobile declined to comment beyond what the company said in its blog post today.
 
  • Angry
Reactions: kazmac
And yet one of the 3 largest cellular provideers in America can‘t do something like this to protect its users. Dumb.
They probably are doing that, but it's not enough. If you own a dealership and only have one person (yourself) accessing the customer info with the key, that's pretty easy to secure. He's only guarding against one particular kind of attack, the database disks themselves being stolen or otherwise accessed.

A big company needs much more sophisticated access than that. Someone or some spyware gets on the inside with the right creds, and they get stuff.
 
Last edited:
That all sounds nice in theory but as we know nothing is ever 100% secure. For a small business, you can more easily lock things down and restrict access. When you talk about large corporations with so many different facets and functions it becomes much harder to grant access to those who need it, trust everyone that is involved, and keep hardware and software secure. There are just so many more variables that you really can't compare.

This isn't the case though, it's just that some big companies, like T Mobile, do not want to spend the money to protect their data. They calculate how much it would cost to protect it, and the damage to their reputation and lawsuits if it's stolen. And they find a balance that favours saving money.

Amazon and Google haven't been hacked. And neither have many other big companies. But the key thing is how your data is stored, if it's stolen can a hacker get your data etc.
 
Not saying companies shouldn’t be held responsible — they should.

But it’s long past due that we moved past the antiquated SSN system in the US, whereby anyone who gets your SSN immediately has a vast ocean of information and resources at their disposal, including the ability to file false tax returns. Every other modern country I’ve been to has managed to establish a National ID number system that doesn’t automatically unlock troves just by a stranger knowing your ID#.
 
I've been a Sprint customer for years before it was merged with T-Mobile. I still can log into Sprint website and access my account. It's not clear if this database was also breached. Either way I'm changing everything. Lucky my three credit reporting agencies been frozen ever since that Equifax data breach fiasco.

I was a Sprint customer too up until June and was worried just the same until I read the report on it from Brian Krebs

“All T-Mobile USA prepaid and postpaid customers are affected; Sprint and the other telecoms that T-Mobile owns are unaffected.


At this point though, F*** T-Mobile..........they deserve to either go under, get sued into the ground or get bought out for this.

There have been some great tips posted already on how to safeguard info - think I might preemptively act on them here.
 
I own a small car dealership and I encrypt all of my customer's data at rest. I could hand my database to a hacker with next to nothing compromised. You'd need to dump my database and steal the secret in memory key.

In 2021 these billion dollar companies need to be held accountable. Unacceptable.

Perhaps I missed it when reading the article, where did it state the data wasn't encrypted at rest?

The trouble comes when the remote hacker also captures the credentials / key to decrypt the data or breaks into applications with access to the data. Something you're susceptible to as well.
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.