7/25/2023 0 Comments Tmobile data breachOther important factors that could affect future results and cause those results to differ materially from those expressed in the forward-looking statements include, among others, the following: natural disasters, public health crises, including adverse impact caused by the COVID-19 pandemic competition, industry consolidation and changes in the market for wireless services disruption, data loss or other security breaches, such as the criminal cyberattack we became aware of in August 2021 and including risks related to the cybersecurity incident discussed above our inability to take advantage of technological developments on a timely basis our inability to retain or motivate key personnel, hire qualified personnel or maintain our corporate culture system failures and business disruptions, allowing for unauthorized use of or interference with our network and other systems the scarcity and cost of additional wireless spectrum, and regulations relating to spectrum use the impacts of the actions we have taken and conditions we have agreed to in connection with the regulatory proceedings and approvals of the Transactions (as defined below), including the acquisition by DISH Network Corporation (“DISH”) of the prepaid wireless business operated under the Boost Mobile and Sprint prepaid brands (excluding the Assurance brand Lifeline customers and the prepaid wireless customers of Shentel and Swiftel Communications, Inc.), including customer accounts, inventory, contracts, intellectual property and certain other specified assets (the “Prepaid Business”), and the assumption of certain related liabilities (collectively, the “Prepaid Transaction”), the complaint and proposed final judgment (the “Consent Decree”) agreed to by us, Deutsche Telekom AG (“DT”), Sprint Corporation, now known as Sprint LLC (“Sprint”), SoftBank Group Corp. Further, our ability to fully assess and remedy the cybersecurity incident, and the legal, reputational and financial risks resulting from this or other cyber incidents, could also cause our results to differ materially from the forward-looking statements made above. In particular, the preliminary nature of our investigation into this cyber incident, which is still ongoing, may uncover additional facts presently not known to us, which may cause us to reassess the impacts and scope of the cyber incident on our customers and on the Company’s business and operations. Forward-looking statements are based on current expectations and assumptions, which are subject to risks and uncertainties and may cause actual results to differ materially from the forward-looking statements. These forward-looking statements are generally identified by the words “anticipate,” “believe,” “estimate,” “expect,” “intend,” “may,” “could” or similar expressions. All statements other than statements of historical fact are forward-looking statements. This communication includes forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. While we, like any other company, are unfortunately not immune to this type of criminal activity, we plan to continue to make substantial, multi-year investments in strengthening our cybersecurity program. We understand that an incident like this has an impact on our customers and regret that this occurred. Some basic customer information (nearly all of which is the type widely available in marketing databases or directories) was obtained, including name, billing address, email, phone number, date of birth, account number, and information such as the number of lines on the account and service plan features. No passwords, payment card information, social security numbers, government ID numbers or other financial account information were compromised. While no information was obtained for impacted customers that would compromise the safety of customer accounts or finances, we want to be transparent with our customers and ensure they are aware. There is also no evidence that the bad actor breached or compromised T-Mobile’s network or systems. Our systems and policies prevented the most sensitive types of customer information from being accessed, and as a result, customer accounts and finances should not be put at risk directly by this event. Janu– (Bellevue, Wash.) – We are currently in the process of informing impacted customers that after a thorough investigation we have determined that a bad actor used a single Application Programming Interface (or API) to obtain limited types of information on their accounts.Īs soon as our teams identified the issue, we shut it down within 24 hours.
0 Comments
Leave a Reply. |