Security Experts:

Connect with us

Hi, what are you looking for?



T-Mobile Hack Involved Exposed Router, Specialized Tools and Brute Force Attacks

American Living in Turkey Takes Credit for T-Mobile Hack 

American Living in Turkey Takes Credit for T-Mobile Hack 

T-Mobile’s CEO and an individual who claims to be behind the recent hacking of the mobile carrier’s systems have shared some information about how the attack was carried out.

In a statement issued on Friday, Mike Sievert, CEO of T-Mobile, said that while the company’s investigation into the incident was “substantially complete,” he could not share too many technical details due to the criminal investigation conducted by law enforcement. He did, however, share a high-level summary of the attack.

“What we can share is that, in simplest terms, the bad actor leveraged their knowledge of technical systems, along with specialized tools and capabilities, to gain access to our testing environments and then used brute force attacks and other methods to make their way into other IT servers that included customer data,” he said. “In short, this individual’s intent was to break in and steal data, and they succeeded.”

The Wall Street Journal reported last week that a 21-year-old man named John Binns, a US citizen living in Turkey, has taken credit for the attack, a claim that he demonstrated to the news outlet by sending messages from a Telegram account that had been used to discuss details of the breach before it became widely known.

Binns told the WSJ that he managed to infiltrate T-Mobile’s systems after identifying a vulnerable, internet-exposed router in July. He allegedly found the router using a simple, publicly-available tool. Some have speculated that this tool was likely Shodan, Nmap or Masscan.

He claimed that the router provided an entry point to T-Mobile servers in a data center near East Wenatchee, Washington, from where he obtained credentials that gave him access to more than 100 servers. Binns, who described T-Mobile’s security as “terrible,” claimed it took him roughly a week to breach the servers storing customer data.

The man said he carried out the attack to get attention. Last year, he filed a lawsuit against the CIA, FBI and other US government agencies, claiming that he had been blackmailed, surveilled and tortured.

Some cybersecurity experts have linked the online accounts used by Binns to gamers who infected devices around the world with malware in an effort to create botnets.

The T-Mobile breach came to light earlier this month, when someone offered to sell 100 million customer records on the dark web for roughly $280,000 in bitcoin. However, it’s unclear if or how much of the data was acquired by others.

T-Mobile has confirmed that the breach impacts more than 54 million current, former and prospective customers. Compromised data includes names, dates of birth, phone numbers, addresses, SSNs, driver’s license information, IMEI and IMSI information, and account PINs. The company highlighted on several occasions, including in Sievert’s statement on Friday, that customer financial information has not been exposed.

Sievert has apologized to customers for the incident and the company is offering impacted individuals two years of free identity protection services. The company has also promised to take steps to prevent these types of incidents in the future.

However, T-Mobile has disclosed several data breaches over the past years and it doesn’t seem to have learned from those incidents, something that has been mentioned in the lawsuits filed against the carrier as a result of the latest breach.

Related: T-Mobile Outage Mistaken for Massive DDoS Attack on U.S.

Related: T-Mobile Data Breach Hits Over 2 Million Customers

Related: Hackers Accessed Information of T-Mobile Prepaid Customers

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.