Recent T-Mobile Hack- What Happened and What to Do

          In recent news, T-Mobile has announced that on Monday, 8/20/18, hackers may have potentially stolen information on some of its customers. During the hack, T-Mobile customers’ personal data may have been accessed before the breach was stopped. Some of this data included, names, phone numbers, zip codes, account numbers and types, as well as email addresses. While this certainly is unpleasant news, it is reported that sensitive information such as credit card numbers, passwords, and social security numbers were not part of the breach. The hackers were part of an “international group” and achieved this feat by exploiting an internal API (Application Programming Interface) on T-Mobile’s servers. According to T-Mobile, more than 2 million of its customers were affected by this; although that seems like a high number, it is important to note that is only about 3% of its total customer base.

         So now that I have described what has actually happened, I will address the more important question, what should I, the customer, do about it? Thankfully, T-Mobile announced that they will be sending out text messages to all affected customers, which should have already been sent to you as I was a little late posting this. The message should that was sent will have been the following, “Hello—We ID’d & shut down an unauthorized capture of your info. No financial info/SSN taken but some personal info may have been. More:” If you have received this message, there is not much you can do to make sure this doesn’t happen again, although, I would recommend changing your password anyways. Since the attack was on T-Mobile’s servers, there isn’t anything customers can do to help improve their security. I hope this information helps reassure you of your personal safety and trust in T-Mobile, as any kind of data breach can be terrifying without the proper information on the event.


Keane, Sean. (2018, August 24). T-Mobile hack may have exposed data of 2 million customers. Retrieved from 

Categories: Security

Tagged as: , ,

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s