Hackers to T-Mobile Network: We Own You, Offers Stolen Data to Highest Bidder

June 8, 2009

(ChattahBox)—Unknown Cyber Crooks made a bold move on Saturday, by posting an open letter to the cyber security community on the site, insecure.org, claiming they hacked into the T-Mobile U.S. network, stealing financial documents, customer databases and other proprietary data. The hackers are offering the stolen data to the highest bidder.

Although not yet confirmed as legitimate, the hackers posted a data dump of servers and code at the end of their post, which former T-Mobile network administrators say appears to be genuine.

The post claims, “Like Checkpoint, T-Mobile has been owned for some time,” apparently referring to alleged vulnerabilities in Check Point Software Technologies.

The post goes on to say: “We already contacted with their [T-Mobile] competitors and they didn’t show interest in buying their data -probably because the mails got to the wrong people- so now we are offering them for the highest bidder.”

“Please only serious offers, don’t waste our time,” said the hackers in an ominous tone.

Meanwhile, T-Mobile is fully investigating the threat and promises to inform those affected by any breach as soon as possible.

Source


Comments

One Response to “Hackers to T-Mobile Network: We Own You, Offers Stolen Data to Highest Bidder”

  1. Hackers to T-Mobile Network: We Own You, Offers Stolen Data to Highest Bidder « AddingInfo.com on June 8th, 2009 11:04 pm

    […] and other proprietary data. The hackers are offering the stolen data to the highest … Read Full Post: Hackers to T-Mobile Network: We Own You, Offers Stolen Data to Highest Bidder Adding Related Info:Sprint offering $40 monthly mobile business data plan – IT WorldZer01 Mobile To […]

Got something to say? **Please Note** - Comments may be edited for clarity or obscenity, and all comments are published at the discretion of ChattahBox.com - Comments are the opinions of the individuals leaving them, and not of ChattahBox.com or its partners. - Please do not spam or submit comments that use copyright materials, hearsay or are based on reports where the supposed fact or quote is not a matter of public knowledge are also not permitted.