Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
67,555
37,931



A security vulnerability in T-Mobile's website let anyone gain access to the personal details of any T-Mobile customer using just a phone number, reports ZDNet.

An internal T-Mobile employee tool, promotool.t-mobile.com, had a hidden API that provided T-Mobile customer data when a customer's cell phone number was added to the end of the web address. Data that was available included full name, address, billing account number, and for some customers, tax identification numbers.

tmobile_logo-800x264.jpeg

Account data, such as service status and billing status was also included, but it does not appear that credit card numbers, passwords, or other sensitive information was compromised. ZDNet says that there were "references to account PINs used by customers as a security question" which could be used to hijack T-Mobile accounts.

The API was used by T-Mobile staff to look up customer data, but it was accessible to the public and not protected by a password. T-Mobile rectified the issue in early April after it was disclosed by security researcher Ryan Stevenson, who ultimately earned $1,000.

In a statement provided to ZDNet, T-Mobile says that it does not appear customer data was accessed using the API, but research suggests the API had been exposed since at least October 2017.
A T-Mobile spokesperson said: "The bug bounty program exists so that researchers can alert us to vulnerabilities, which is what happened here, and we support this type of responsible and coordinated disclosure." "The bug was patched as soon as possible and we have no evidence that any customer information was accessed," the spokesperson added.
This is not the first unprotected API issue that T-Mobile has faced. Last year, a similar bug also exposed customer data to hackers.

T-Mobile has more than 74 million customers, and had this most recent bug been exploited, a simple script could have provided hackers with access to data on millions of people.

Article Link: Unprotected T-Mobile API Let Anyone Get Customer Data With Just a Phone Number
 
No customer data has been compromised.. Untill the big investigation and then class action lawsuits.. these are soo predictable!!
 
Pro tip from someone that works in Information Assurance, and has been involved in cleaning up several companies’ similar messes: anytime you see “we have no evidence that any customer information was accessed”, you can assume that they have zero logging. They ‘have no evidence’ because they have no logs; they aren’t saying it didn’t happen, it’s just a nice way to make it seem like nothing bad happened. Ask for evidence proving nothing bad happened, and you’ll be met with a horrified stare.
 
Until we start punishing these stupid mistakes with penalties that actually hurt, this is just going to happen over and over...
I agree. Didn’t California have a law that was in the works? I can’t remeber what State, but these companies need to be hit and hit hard for their foolishness.
 
  • Like
Reactions: danielchow
For all the "uncarrier" stuff that T-Mobile has been pushing for the past few years (which they've already rolled back a lot of), they sure seem to ignore their security.

They screwed a lot of their customers over in the past when they used Experian to run credit checks, knowing full well that their servers might not be secure, but still went along with it. The result? Experian gets hacked, and customers' personal info gets stolen. Then they started asking people to set support line passwords like a month or two ago after scammers were hijjacking people's lines in order to get into bank accounts, and now this.

In the end, they quickly sweep this stuff under the rug, and carry on with business as usual.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.