Feeds

T-Mobile downplays hacking fears

'No evidence customer data compromised'

Build a business case: developing custom apps

T-Mobile USA is fighting suggestions its systems were breached by hackers with a new statement clarifying that although the limited data posted on an underground forum was genuine its ongoing investigation has uncovered no evidence of a wider compromise.

Hackers published system config files from T-Mobile's US network on Saturday alongside claims they had compromised the carrier's core systems. "We have everything, their databases, confidential documents, scripts and programs from their servers, [and] financial documents up to 2009," the anonymous hackers claimed.

The unidentified cybercrooks solicited bids from interested parties via an email address, pwnmobile@safe-mail.net, which has since been shut down.

To support their claim the hackers offered a sample of what appeared to be a network topography map and configuration information about T-Mobile's servers. T-Mobile said on Tuesday that the data posted matches a document on its system while reassuring customers that its ongoing investigation had uncovered nothing to suggest customers' information had been exposed. It promised to notify customers quickly in the event of discovering a breach that affected them.

T-Mobile issued a further (more emphatic) statement on Wednesday stating it had uncovered "no evidence that customer information, or other company information, has been compromised".

Following a recent online posting that someone allegedly accessed T-Mobile servers, the company is conducting a thorough investigation and at this time has found no evidence that customer information, or other company information, has been compromised. Reports to the contrary are inaccurate and should be corrected.

T-Mobile continues to monitor this situation and as a precaution has taken additional measures to further ensure our customers' information and our systems are protected.

As is our standard practice, customers can be assured if there is any evidence that customer or system information has been compromised, we would inform those affected as quickly as possible.

The absence of evidence is no proof of anything, one way or another. T-Mobile's admission that the config file data posted by hackers is itself genuine might be explained by other reasons other than the claims of cybercrooks that they had successfully pwned T-Mobile USA's systems.

An unauthorised network scan - which ought by rights to have been blocked - might have yielded the information which the hackers then attempted to parlay into big bucks via inflated claims of a full compromise. The information might conceivably have come from a corrupt insider, though that seems far less likely.

It's noteworthy that the hackers involved failed to offer a sample of juicy information that might both substantiate their claims and grease the wheels of the auction they attempted to run.

It's even more odd that they attempted to solicit bids via an email address, which was bound to get quickly shut down given the publicity their claimed compromise was bound to attract, rather than an IRC channel or some other underground forum.

T-Mobile USA's position is not helped by the fact that parent firm Deutsche Telekom admitted a breach that exposed 17 million customer records last year, even though it might have nothing to do with the current security flap.

Speculation is running rife and is likely to continue until T-Mobile USA finishes its investigation and issues a definitive statement. ®

Next gen security for virtualised datacentres

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?