Your Information may have been accessed in a data breach and may now be available for purchase on the dark web.
Step 1
Step 2
Step 3
Register Your Information (No Cost To You)
Speak To Our Informative Attorneys
Your Dedicated Attorney Is Fighting For Your Rights. We Keep you Informed Every Step Of The Way
Your details are submitted through the official and secure Levi & Korsinsky T-Mobile Data Breach page.
At no cost to you, you will be informed of your rights and any financial compensation that you may be entitled to.
Levi & Korsinsky – We Give Consumers A Voice
On August 17, 2021, T-Mobile reported that it was the victim of a malicious data breach which exposed personal information of over 47 million T-Mobile customers and prospective customers.
Specifically, T-Mobile confirmed that the data accessed included customers’ first and last names, dates of birth, social security numbers, and driver’s license information/ID information.
As a result, affected individuals are at a heightened risk for fraud and identity theft for years to come.
Levi & Korsinsky can help you bring a claim against T-Mobile if your data was compromised.
T-Mobile had a malicious cyberattack on their systems. They have informed customers that the breach has been contained and their investigation is substantially complete.
John Brinns (21-year-old) claims responsibility for the hacking. He spoke out in an interview with The Wall Street Journal about the hack and revealed that T-Mobile had weak spots in its internet addresses and unprotected routers that allowed him to access over 100 servers. He did not disclose to the Journal whether he sold data or if he was paid for it.
On August 17th, T-Mobile confirmed that their systems were subject to a criminal cyberattack that compromised data of millions of their customers, former customers, and prospective customers. Fortunately, the breach did not expose any customer financial information, credit card information, debit or other payment information but, like so many breaches before, Social Security Numbers, names, addresses, dates of birth and driver’s license/ID information were compromised.
It is T-Mobile’s responsibility to keep the sensitive data of their customers safe and protected. This is an incredibly seriously situation and it is their responsibility to prevent this type of event from happening.
The T-Mobile data breach affected millions of Americans. T-Mobile notified its customers who were affected by the data breach.
The T-Mobile Data Breach affected millions of Americans, and you have resources available to help you to protect yourself and you also may be entitled to financial relief.
If you received notification from T-Mobile that your data was compromised in the data breach, the situation warrants your attention. Below are a few important steps you can take to protect yourself.
The first thing to do after learning that your data was compromised in the data breach is to review the notification that you received. The notification will let you know what type of information was accessible to the unauthorized party. If you have any questions about the notification or what steps you can take to protect yourself, a Levi & Korsinsky lawyer can help.
To prevent future access to any of your accounts, you can consider changing all passwords and security questions for your online accounts, including on your financial accounts or any other account that contains your private information.
You may also consider signing up for a credit monitoring program. T-Mobile is offering two years of free identity protection services with McAfee’s ID Theft Protection Service to any person who believes they may have been affected.
You can also look into implementing a credit freeze. A credit freeze prevents anyone from accessing your credit report. Credit freezes are free and stay in effect until you remove them. You will have to temporarily lift the freeze if you would like to apply for any type of credit.
Lastly, you should closely monitor your credit report and all of your accounts and be on the lookout for any sign of unauthorized activity or fraud.
While monitoring your credit report is a good thing, there are many other things you can do with your personal data. An identity-monitoring company will not only monitor your credit and Social Security numbers, but also look for criminal activity on the dark web. If someone attempts to access your personal information, it should provide you with peace of mind.
It is a simple way to ensure that a breach of one online account doesn’t result in bad guys accessing other online accounts.
Instead of using the same password repeatedly, or multiple passwords, use a password manager to store, create and autofill your login information. T-Mobile will also share best practices for password resets with customers in order to protect their logins and data.
It is important to take action immediately after a breach or hack is reported. Don’t wait for affected companies to tell you how they want it handled. Be proactive. It’s your information, and your financial future, that is at stake.
After you have secured your credit and started monitoring services, start to look at the suggestions of affected companies.
Data breaches are not all created equal. While none of them are perfect, they can be very damaging. It’s easy to get accustomed to these news stories, given the frequency with which they occur. T-Mobile’s breach that hackers claimed involved 100 million people’s data is still something you should be aware of, especially if your company is an “un-carrier”.
If your information was exposed, you may be entitled to compensation under your state’s laws. Please provide your information to Levi & Korsinsky in order to see if you qualify to submit a claim. Register here
There are a few steps that you can take to help you protect yourself or limit the consequences if your data is stolen. For example, you can consider changing your T-Mobile security PIN and password and use app-based authentication rather than having codes sent by text message.
Yes, on August 17, 2021, T-Mobile reported that it was the victim of a malicious data breach which exposed personal information for over 47 million T-Mobile customers and prospective customers. T-Mobile confirmed that the data accessed included customers’ first and last names, dates of birth, Social Security numbers, and driver’s license/ID information.
You may be eligible to bring a claim against T-Mobile. For example consumers in California (California Data Breach Compensation) may seek statutory damages of $100 to $750 , or actual damages to compensate them for fraud, time lost and credit monitoring products they purchased as a result of the breach.
However, this may not be your only compensation, this is why you need to know your rights and what is available to you. Please provide your details to Levi & Korsinsky and we will help you determine whether you have a claim
T-Mobile notified individuals who were affected by the data breach. Notice may have been provided via text, email, letter, or notification on the T-Mobile App.
Data breaches often occur when hackers gain unauthorized access to company systems in an attempt to obtain sensitive consumer information. Although no one knows the exact reason for a hacker targeting T-Mobile. But this occurs because hackers and other criminals are able to identify companies that have weaknesses in their data security systems or network vulnerabilities.
Cybercriminals can gain access to computers networks and access the data on compromised servers. Although most companies can identify the files that were accessed by hackers, it is not possible for them to determine which files they actually accessed and whether any data was deleted.
Although it is not likely that your data will be used to commit crimes, the fact that your data was compromised through a data breach could mean that sensitive information may have been misused. This puts you at risk of identity theft, fraud, and criminal use.
Individuals who receive T-Mobile data breach notifications should be aware of this fact and keep an eye out for signs of unauthorized activity. T-Mobile is responsible for protecting consumer data they have. You may be eligible to receive financial compensation through a data breach lawsuit if there is evidence that T-Mobile failed adequately to protect your sensitive information.
T-Mobile purchased Sprint on April 1st to create a “5G powerhouse.” T-Mobile claimed that they were consolidating all Sprint accounts within their company at the time of the merger. This could have led to some Sprint customers having their data exposed during the data breach. You may wish to take precautionary steps to protect your personal data if you have been a Sprint customer in the past.
T-Mobile customers can access identity protection services through their T-Mobile accounts thanks to its partnership with McAfee security service. These services include credit monitoring, full service ID resolution, $1,000,000 identity insurance, dark web monitoring and credit monitoring to make sure your sensitive data is not on the underground market.
T-Mobile issued a statement confirming the theft of names, dates, births, social security numbers and driver’s license numbers as well as IMEI/IMSI information for approximately 7.8 million customers.
The names and addresses of 40 million other customers or potential customers were also leaked.
Over 5 million “currently postpaid customer accounts” contained information such as names, addresses, dates of births, phone numbers and IMEIs.
T-Mobile stated that another 667,000 accounts were stolen from former T-Mobile customers. This was in addition to 850,000 active T-Mobile Prepaid customers whose names, phone numbers, and account PINs were also exposed.
According to T-Mobile, the names of 52,000 Metro by T-Mobile customers may have been accessed.
n accordance with the T-Mobile website, T-Mobile customers and primary account holders who T-Mobile do not believe were impacted will see a banner on the MyT-Mobile.com login page. T-Mobile is still working to notify prospective and former customers.
Additional T-Mobile also note that you are most likely to have your data compromised if you are a T-Mobile customer, primary account holder, or if you had data such name, current address, social security numbers, or government ID numbers.
The same as the T-Mobile Data breach, the security breach refers to your information being leaked in a data breach and potentially available on the dark web.
The information the hackers were able to access includes:
Names, dates, births, social security numbers and driver’s license numbers as well as IMEI/IMSI information
Information that is compromised during a data breach may be used by cybercriminals to commit identity theft, fraud, and other cybercrimes.
These tips from the Better Business Bureau can help you protect your identity from a data breach: https://www.bbb.org/article/news-releases/24833-bbb-tip-how-to-protect-your-identity-from-a-data-breach. Check to find out if your identity has been compromised.
For more information about the breach, visit the company (T-Mobile) website https://www.t-mobile.com/news/network/cyberattack-against-tmobile-and-our-customers.
Another way to see if your data has been breached is to read this really informative article https://www.cnet.com/news/your-private-data-is-all-over-the-internet-heres-what-you-can-do-about-it/
John Binns, a 21-year-old American citizen, claimed that he was the principal culprit in the attack. Alon Gal, cofounder of Hudson Rock’s cybercrime intelligence firm Hudson Rock said so.
His father was American, and his mother Turkish. He died at the age of two. Binns was 18 when he and his mother returned to Turkey.
Binns was born in the USA but now resides in Izmir in Turkey. He claimed that he carried out the attack from his house. Telegram provided Binns with evidence to the Wall Street Journal that proved he was behind T-Mobile’s attack. Binns also told reporters that he had originally gained access to T-Mobile’s network via an unprotected router in July.
According to Wall Street Journal, he was searching through T-Mobile’s internet addresses for weaknesses in its defenses and found one. He then gained access to a data centre near East Wenatchee Washington, where he could examine more than 100 servers. It took him about a week to access the servers that held the personal information of millions. He had already stolen millions of files by August 4.
“I panicked because I had access the big stuff. They have terrible security,” Binns said to the Wall Street Journal. “Generating noise was our goal.”
Bleeping Computer was informed by him that he had gained access to T-Mobile systems via “production, staging and development servers” two weeks ago. He broke into an Oracle database server containing customer data.
Binns shared with Bleeping Computer reporters a screenshot of his SSH connection from a production server running Oracle to prove that it was true. According to the interview with Bleeping Computer, they didn’t try to kidnap T-Mobile as they had buyers online.
He told Motherboard that he had stolen data from T-Mobile’s servers. T-Mobile eventually kicked him out, but not before making copies of the data.
According to Motherboard and Bleeping Computer, Binns and other underground hackers were found selling a sample containing 30 million social security numbers, driver licenses, and more for 6 bitcoin.
We understand the stress and frustration that can result from your information being exposed in a data breach. If you believe that your information was exposed in the T-Mobile data breach, you may be entitled to compensation. Levi & Korsinsky can help to advocate for your rights. We can provide you with a free, no-risk evaluation of your potential claims against T-Mobile.
You may be eligible to bring a claim against T-Mobile and you may be entitled to statutory damages or actual damages for harm you have experienced as a result of the T-Mobile data breach. To find out more, submit your details here.
To determine if you have a claim, the knowledgeable legal team at Levi & Korsinsky can help you evaluate your options.
Provide your details to Levi & Korsinsky who will help you with your questions and see if you have a claim.
If you are or were a T-Mobile customer, prepaid customer, Sprint customer, Verizon customer, Metro PCS customer or a previous customer of any of these products and services, then register your details at no out-of-pocket cost to you and our knowledgeable attorneys will discuss your options with you.
Who Is
Levi & Korsinsky?
Levi & Korsinsky works hard to protect consumers by holding corporations accountable for defective products, false and misleading advertising, unfair or deceptive business practices, antitrust violations, and privacy right violations.
Our litigation and class action expertise combined with our in-depth understanding of federal and state laws enable us to fight for consumers who have been aggrieved by deceptive and unfair business practices and who purchased defective products, including automobiles, appliances, electronic goods, and other consumer products. The Firm also represents consumers in cases involving data breaches and privacy right violations. The Firm’s attorneys have received a number of leadership appointments in consumer class action cases, including multidistrict litigation (“MDL”). Recently, Law.com identified the Firm as one of the top firms with MDL leadership appointments in the article titled, “There Are New Faces Leading MDLs. And They Aren’t All Men” (July 6, 2020)
Apple Inc. Device Performance
Apple has agreed to pay up to $500 million in cash (proposed settlement pending).
Citrix Data Breach
settlement of $2.25 million pending
Vonage America, Inc
settlement of $1.75 million
How Else Can
Levi & Korsinsky Help You?
Between our Consumer and Shareholders Divisions, we have you covered.
The information provided on this website does not, and is not intended to, constitute legal advice. All information, content, and materials available on this site are for general informational purposes only. The submission of information to Levi & Korsinsky, LLP does not create an attorney-client relationship automatically.