{"id":44623,"date":"2021-12-29T17:17:58","date_gmt":"2021-12-29T17:17:58","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32948\/T-Mobile-Reportedly-Suffers-Another-Data-Breach.html"},"modified":"2021-12-29T17:17:58","modified_gmt":"2021-12-29T17:17:58","slug":"t-mobile-reportedly-suffers-another-data-breach","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/","title":{"rendered":"T-Mobile Reportedly Suffers Another Data Breach"},"content":{"rendered":"<figure class=\"image image-large pull-none shortcode\" section=\"shortcodeImage\"><span class=\"imageContainer\"><span><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cnet.com\/a\/img\/dSKTsPVzRFNxKkQd1Z97qwAX0Q0=\/1092x0\/2021\/03\/31\/2d61db07-0a45-4178-a741-be53eefd17f6\/007-t-mobile-network-mobile-carrier-logo-2021.jpg\" class alt=\"007-t-mobile-network-mobile-carrier-logo-2021\" height=\"729\" width=\"1092\"><\/span><\/span><figcaption><span class=\"credit\"> Sarah Tew\/CNET <\/span><\/figcaption><\/figure>\n<p class=\"speakableTextP1\"><a href=\"https:\/\/www.cnet.com\/tags\/t-mobile\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|T-Mobile|CNET_TAG|562&quot;}\" section=\"annotation\">T-Mobile<\/a>&nbsp;has suffered another data breach, just a few months after a&nbsp;<span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/tech\/services-and-software\/t-mobile-data-breach-more-than-50-million-people-now-affected\/\">huge breach in August<\/a><\/span>, the carrier confirmed Wednesday. &#8220;We informed a very small number of customers that the SIM card assigned to a mobile number on their account may have been illegally reassigned or limited account information was viewed,&#8221; the company said in an email.<\/p>\n<p class=\"speakableTextP2\">The new breach affected a smaller group of customers than the more than 50 million people hit in August, and the latest victims received notifications from T-Mobile of &#8220;unauthorized activity&#8221; including hackers viewing customer proprietary network information,&nbsp;<a href=\"https:\/\/tmo.report\/2021\/12\/t-mobile-has-suffered-yet-another-data-breach\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\" data-component=\"externalLink\">according to<\/a>&nbsp;a Tuesday post by blog The T-Mo Report.&nbsp;<\/p>\n<p>&#8220;Customer proprietary network information,&#8221; or CPNI, includes&nbsp;<a href=\"https:\/\/www.t-mobile.com\/privacy-center\/education-and-resources\/cpni\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">all the data T-Mobile has about your phone calls<\/a>, which, according to the carrier, means &#8220;features of your voice calling service (e.g., international calling), usage information (like call logs \u2014 including date, time, phone numbers called, and duration of calls), and quantitative data like minutes used.&#8221; CPNI doesn&#8217;t contain any billing-related information, like names or addresses.&nbsp;<\/p>\n<p>An unapproved physical SIM swap enables someone else to take over your phone number, and if that person has your password, to potentially gain access to accounts linked to it &#8212; such as if you use texts for multifactor authentication. (If that&#8217;s happened to you,&nbsp;<span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/tech\/mobile\/t-mobile-data-breach-and-sim-swap-scam-how-to-protect-your-identity\/\">here&#8217;s what to do next<\/a><\/span>.) T-Mobile said it&#8217;s addressed the problem.&nbsp;<\/p>\n<p>&#8220;Unauthorized SIM swaps are unfortunately a common industry-wide occurrence. However, this issue was quickly corrected by our team, using our in-place safeguards, and we proactively took additional protective measures,&#8221; the carrier said. &#8220;Our people and processes worked as designed to protect our customers.&#8221;<\/p>\n<p><svg class=\"svg-symbol playerControls\"><symbol id=\"play\" viewBox=\"0 0 26.6 32\"><path d=\"M0,2.6c0-2.4,1.6-3.3,3.7-2L25,13.7c2,1.3,2,3.2,0,4.5L3.7,31.4c-2,1.3-3.7,0.3-3.7-2C0,29.4,0,2.6,0,2.6z\" \/><\/symbol><symbol id=\"pause\" viewBox=\"0 0 26.6 32\"><g><polygon points=\"16,32 26.5,32 26.5,8.8 26.5,0 16,0\" \/><rect x=\"0.1\" y=\"0\" width=\"10.6\" height=\"32\" \/><\/g><\/symbol><symbol id=\"playlist\" viewBox=\"0 0 32 22.9\"><g><circle class=\"st11\" cx=\"2.3\" cy=\"20.6\" r=\"2.3\" \/><circle class=\"st11\" cx=\"2.3\" cy=\"11.4\" r=\"2.3\" \/><circle class=\"st11\" cx=\"2.3\" cy=\"2.3\" r=\"2.3\" \/><path class=\"st11\" d=\"M32,1.1C32,0.5,31.5,0,30.9,0H10.3C9.7,0,9.1,0.5,9.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V1.1z\" \/><path class=\"st11\" d=\"M32,10.3c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V10.3z\" \/><path class=\"st11\" d=\"M32,19.4c0-0.6-0.5-1.1-1.1-1.1H10.3c-0.6,0-1.1,0.5-1.1,1.1v2.3c0,0.6,0.5,1.1,1.1,1.1h20.6c0.6,0,1.1-0.5,1.1-1.1V19.4z\" \/><\/g><\/symbol><symbol id=\"speaker-on\" viewBox=\"0 0 32 28.1\"><g><g><path d=\"M12.6,5L6.3,8.7H0.6C0.3,8.7,0,9,0,9.3V19c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V6.5C14.2,4.8,13.9,4.2,12.6,5z\" \/><\/g><path d=\"M18,23.1v-2.8c2.6,0,4.7-2.8,4.7-6.2S20.6,7.8,18,7.8V5c4.2,0,7.5,4,7.5,9S22.1,23.1,18,23.1z\" \/><path d=\"M21.3,28.1v-2.8c4.4,0,7.9-5,7.9-11.2S25.6,2.8,21.3,2.8V0C27.2,0,32,6.3,32,14C32,21.8,27.2,28.1,21.3,28.1z\" \/><\/g><\/symbol><symbol id=\"speaker-off\" viewBox=\"0 0 32 18.8\"><g><g><path d=\"M12.6,0.4L6.3,4H0.6C0.3,4,0,4.3,0,4.7v9.7c0,0.4,0.3,0.7,0.6,0.7h5.9l6.1,3.4c1.3,0.8,1.5,0.2,1.5-1.5V1.8C14.2,0.2,13.9-0.5,12.6,0.4z\" \/><\/g><polygon points=\"32,4.5 30.2,2.7 25.3,7.6 20.4,2.7 18.6,4.5 23.5,9.4 18.6,14.3 20.4,16.1 25.3,11.2 30.2,16.1 32,14.3 27.1,9.4 \" \/><\/g><\/symbol><symbol id=\"captions\" viewBox=\"0 0 32 16.2\"><g><path d=\"M8.6,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6C0.2,10.4,0,9.3,0,8.1c0-1.2,0.2-2.3,0.7-3.3s1-1.8,1.8-2.6C3.2,1.5,4.1,1,5.2,0.6S7.4,0,8.6,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5c0.4,0.5,0.7,1.1,0.9,1.6l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9C11,5.3,10.8,5,10.5,4.8c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2C8,4.2,7.5,4.3,7,4.5C6.6,4.7,6.2,5,5.8,5.3C5.5,5.7,5.2,6.1,5.1,6.5C4.9,7,4.8,7.5,4.8,8.1c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8C7.5,11.9,8,12,8.6,12c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C10.5,16,9.6,16.2,8.6,16.2z\" \/><path d=\"M24.9,16.2c-1.2,0-2.4-0.2-3.4-0.6c-1.1-0.4-2-0.9-2.7-1.6c-0.8-0.7-1.4-1.6-1.8-2.6c-0.4-1-0.7-2.1-0.7-3.3c0-1.2,0.2-2.3,0.7-3.3c0.4-1,1-1.8,1.8-2.6c0.8-0.7,1.7-1.3,2.7-1.7C22.6,0.2,23.7,0,24.9,0c1,0,1.9,0.1,2.7,0.4c0.8,0.3,1.4,0.6,2,1.1c0.6,0.4,1.1,0.9,1.4,1.5C31.5,3.5,31.8,4,32,4.5l-4.1,1.9c-0.1-0.3-0.2-0.6-0.4-0.9c-0.2-0.3-0.4-0.5-0.7-0.7c-0.3-0.2-0.6-0.4-0.9-0.5c-0.3-0.1-0.7-0.2-1-0.2c-0.6,0-1.1,0.1-1.5,0.3c-0.5,0.2-0.9,0.5-1.2,0.8c-0.3,0.4-0.6,0.8-0.8,1.2c-0.2,0.5-0.3,1-0.3,1.5c0,0.5,0.1,1.1,0.3,1.5c0.2,0.5,0.4,0.9,0.8,1.2c0.3,0.4,0.7,0.6,1.2,0.8c0.5,0.2,1,0.3,1.5,0.3c0.3,0,0.7-0.1,1-0.2c0.3-0.1,0.6-0.3,0.9-0.5c0.3-0.2,0.5-0.4,0.7-0.7c0.2-0.3,0.3-0.6,0.4-0.9l4.1,1.9c-0.2,0.5-0.5,1-0.9,1.6c-0.4,0.5-0.9,1-1.4,1.5c-0.6,0.4-1.2,0.8-2,1.1C26.8,16,25.9,16.2,24.9,16.2z\" \/><\/g><\/symbol><symbol id=\"share\" viewBox=\"0 0 32 20\"><path d=\"M20,6c0,0-7.9-0.1-13.2,3.3C1.6,12.7,0,20,0,20s5.1-5.4,9.8-7.2C14.9,10.9,20,12,20,12v6l12-8L20,0V6z\" \/><\/symbol><symbol id=\"fullscreen\" viewBox=\"0 0 32 32\"><g><g><polygon class=\"st11\" points=\"11.4,0 0,0 0,11.4 3.4,8 9.1,13.7 13.7,9.1 8,3.4 \" \/><\/g><g><polygon class=\"st11\" points=\"20.6,32 32,32 32,20.6 28.6,24 22.9,18.3 18.3,22.9 24,28.6 \" \/><\/g><g><polygon class=\"st11\" points=\"32,11.4 32,0 20.6,0 24,3.4 18.3,9.1 22.9,13.7 28.6,8 \" \/><\/g><g><polygon class=\"st11\" points=\"0,20.6 0,32 11.4,32 8,28.6 13.7,22.9 9.1,18.3 3.4,24 \" \/><\/g><\/g><\/symbol><symbol id=\"video\" viewBox=\"0 0 32 22\"><g><path d=\"M29,2.2c-0.7,0.2-4.6,3-7.9,5.3V2.1C21.1,1,20.1,0,19,0H2.1C1,0,0,1,0,2.1v17.7C0,21,1,22,2.1,22H19c1.2,0,2.1-1,2.1-2.1v-5.9c3.3,2.4,7.4,5.4,8.2,5.6c1.4,0.4,2.7-0.1,2.7-0.1V2.2C32,2.2,30.1,1.8,29,2.2z\" \/><\/g><\/symbol><\/svg> <\/p>\n<div class=\"shortcode video v2\" data-video-playlist=\"[{&quot;id&quot;:&quot;1f844917-8b2c-4337-b63f-3186637a590e&quot;,&quot;title&quot;:&quot;T-Mobile data breach: What you need to know&quot;,&quot;description&quot;:&quot;If you are, were or applied to be a T-Mobile customer, your data may have been compromised. Find out what you should do to protect yourself.&quot;,&quot;slug&quot;:&quot;t-mobile-data-breach-what-you-need-to-know&quot;,&quot;chapters&quot;:{&quot;data&quot;:[],&quot;paging&quot;:{&quot;total&quot;:0,&quot;limit&quot;:15,&quot;offset&quot;:0}},&quot;datePublished&quot;:&quot;2021-08-19 20:10:00&quot;,&quot;duration&quot;:162,&quot;mpxRefId&quot;:&quot;T2Si8W_gEtS1TGY3G5Z5kiQoyeQ_xQL6&quot;,&quot;ratingVChip&quot;:&quot;TV-14&quot;,&quot;primaryTopic&quot;:{&quot;id&quot;:&quot;1c1fbb47-c387-11e2-8208-0291187b029a&quot;},&quot;author&quot;:{&quot;id&quot;:&quot;&quot;,&quot;firstName&quot;:&quot;&quot;,&quot;lastName&quot;:&quot;&quot;},&quot;primaryCollection&quot;:{&quot;id&quot;:&quot;040fa0bc-bf08-43dc-ac3d-ee7869a9fc85&quot;,&quot;title&quot;:&quot;CNET News Video&quot;},&quot;image&quot;:{&quot;path&quot;:&quot;https:\\\/\\\/www.cnet.com\\\/a\\\/img\\\/vfVQQZ_88JZrnnRxJgG-Cexyby0=\\\/940x528\\\/2019\\\/11\\\/21\\\/83fdd283-8dc4-4fa9-8eee-1e674e193a32\\\/t-mobile-gettyimages-1165309440.jpg&quot;},&quot;thumbnail&quot;:&quot;https:\\\/\\\/www.cnet.com\\\/a\\\/img\\\/IOT_5EeNKFnJvA3kI1Rihpg1icI=\\\/194x109\\\/2019\\\/11\\\/21\\\/83fdd283-8dc4-4fa9-8eee-1e674e193a32\\\/t-mobile-gettyimages-1165309440.jpg&quot;,&quot;closedCaptionPath&quot;:&quot;\\\/videos\\\/captions\\\/webvtt\\\/t-mobile-data-breach-what-you-need-to-know.vtt&quot;,&quot;urlPath&quot;:&quot;\\\/videos\\\/t-mobile-data-breach-what-you-need-to-know\\\/&quot;,&quot;isVertical&quot;:false,&quot;m3u8&quot;:&quot;https:\\\/\\\/mt-rv-v1.cnet.com\\\/vr\\\/2021\\\/08\\\/19\\\/1935039043994\\\/652107_hls\\\/master.m3u8&quot;,&quot;mp4&quot;:&quot;https:\\\/\\\/mt-rv-v1.cnet.com\\\/vr\\\/2021\\\/08\\\/19\\\/1935039043994\\\/tmobiledatabreach_652106_740.mp4&quot;,&quot;index&quot;:0}]\" readability=\"6\">\n<div class=\"embeddedVideoContainer\" tabindex=\"0\" aria-label=\"Play video T-Mobile data breach: What you need to know\" data-load-video=\"0\" data-video-id=\"1f844917-8b2c-4337-b63f-3186637a590e\" readability=\"7\">\n<div class=\"videoContainer\"> <svg class=\" play\"> <use aria-hidden=\"false\" xlink:href=\"#play\" \/>\n<\/svg> <svg class=\" pause\"> <use aria-hidden=\"false\" xlink:href=\"#pause\" \/>\n<\/svg> <\/p>\n<figure class=\" img\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cnet.com\/tech\/mobile\/t-mobile-reportedly-suffers-another-smaller-data-breach\/\" data-original=\"https:\/\/www.cnet.com\/a\/img\/IUZYDKeQZ0JjL2Wb5P33sGKGECQ=\/196x110\/2019\/11\/21\/83fdd283-8dc4-4fa9-8eee-1e674e193a32\/t-mobile-gettyimages-1165309440.jpg\" class=\"photo lazy\" alt height=\"110\" width=\"196\"><noscript><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cnet.com\/a\/img\/IUZYDKeQZ0JjL2Wb5P33sGKGECQ=\/196x110\/2019\/11\/21\/83fdd283-8dc4-4fa9-8eee-1e674e193a32\/t-mobile-gettyimages-1165309440.jpg\" class=\"photo\" alt height=\"110\" width=\"196\"><\/noscript><\/figure>\n<\/p><\/div>\n<p> <span class=\"bold\"> <span class=\"nowPlaying\">Now playing:<\/span> <span class=\"watchThis\">Watch this:<\/span> <\/span> T-Mobile data breach: What you need to know <\/p>\n<p> <span class=\"duration\"> <svg class=\" video\"> <use aria-hidden=\"false\" xlink:href=\"#video\" \/>\n<\/svg><br \/>\n2:42 <\/span> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"newsletter-subscribe-form desktop -inline \" section=\"subscribeNewsletter\" data-track=\"newsletter\" readability=\"6\">\n<div class=\"newsletterTitle \">\n<div class=\"heading\">\n<p>CNET Mobile <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"newsletter\" readability=\"7\">\n<p class=\"description\">Discover the latest news and best reviews in smartphones and carriers from CNET&#8217;s mobile experts.<\/p>\n<\/p><\/div>\n<\/div>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32948\/T-Mobile-Reportedly-Suffers-Another-Data-Breach.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44624,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9800],"class_list":["post-44623","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacyphonedata-lossfraud"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>T-Mobile Reportedly Suffers Another Data Breach 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"T-Mobile Reportedly Suffers Another Data Breach 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-29T17:17:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cnet.com\/a\/img\/dSKTsPVzRFNxKkQd1Z97qwAX0Q0=\/1092x0\/2021\/03\/31\/2d61db07-0a45-4178-a741-be53eefd17f6\/007-t-mobile-network-mobile-carrier-logo-2021.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"T-Mobile Reportedly Suffers Another Data Breach\",\"datePublished\":\"2021-12-29T17:17:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/\"},\"wordCount\":320,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/t-mobile-reportedly-suffers-another-data-breach.jpg\",\"keywords\":[\"headline,hacker,privacy,phone,data loss,fraud\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/\",\"name\":\"T-Mobile Reportedly Suffers Another Data Breach 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/t-mobile-reportedly-suffers-another-data-breach.jpg\",\"datePublished\":\"2021-12-29T17:17:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/t-mobile-reportedly-suffers-another-data-breach.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/t-mobile-reportedly-suffers-another-data-breach.jpg\",\"width\":1092,\"height\":728},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/t-mobile-reportedly-suffers-another-data-breach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,phone,data loss,fraud\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacyphonedata-lossfraud\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"T-Mobile Reportedly Suffers Another Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"T-Mobile Reportedly Suffers Another Data Breach 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"T-Mobile Reportedly Suffers Another Data Breach 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-29T17:17:58+00:00","og_image":[{"url":"https:\/\/www.cnet.com\/a\/img\/dSKTsPVzRFNxKkQd1Z97qwAX0Q0=\/1092x0\/2021\/03\/31\/2d61db07-0a45-4178-a741-be53eefd17f6\/007-t-mobile-network-mobile-carrier-logo-2021.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"T-Mobile Reportedly Suffers Another Data Breach","datePublished":"2021-12-29T17:17:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/"},"wordCount":320,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/t-mobile-reportedly-suffers-another-data-breach.jpg","keywords":["headline,hacker,privacy,phone,data loss,fraud"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/","url":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/","name":"T-Mobile Reportedly Suffers Another Data Breach 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/t-mobile-reportedly-suffers-another-data-breach.jpg","datePublished":"2021-12-29T17:17:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/t-mobile-reportedly-suffers-another-data-breach.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/t-mobile-reportedly-suffers-another-data-breach.jpg","width":1092,"height":728},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/t-mobile-reportedly-suffers-another-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,phone,data loss,fraud","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacyphonedata-lossfraud\/"},{"@type":"ListItem","position":3,"name":"T-Mobile Reportedly Suffers Another Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44623"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44623\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44624"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}