Attacks/Breaches
11/17/2009
06:04 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

T-Mobile Says Employees Sold Customer Data

A report issued by the U.K. Information Commission's Office calls for action against the unlawful sale of personal data.

T-Mobile employees are alleged to have stolen the personal information of thousands of customers and to have sold the data to rivals.

The Information Commissioner's Office (ICO) in the U.K. on Tuesday said that it had been approached by an unnamed mobile telephone service provider with information about employees believed to be selling customer data.

The data included mobile phone contract information and expiration dates.

In a statement on its Web site, T-Mobile said that it alerted the ICO when it learned that contract renewal information was being passed to third parties without its knowledge.

The mobile provider told the ICO that the information was being sold to competing service providers for lead generation: Competitors allegedly used the information to solicit T-Mobile customers whose contracts were about to expire.

"The customer information that was compromised contained no personal financial or security-related information whatsoever," the company said.

The ICO said that "substantial amounts of money have changed hands" and that a prosecution case is being prepared.

T-Mobile said it was "surprised" that its name had been publicly reported because it had been previously asked to keep all information about the incident confidential to avoid hindering the investigation and judicial proceedings.

"Whilst it is deeply regrettable that customer information has been misapproriated in this way, we have proactively supported the ICO to help stamp out what is a problem for the whole industry," said T-Mobile in its statement.

Information Commissioner Christopher Graham said that as more and more data is collected and as data collection systems become increasingly intertwined, the risk that such data may be abused will only increase.

"Many people will have wondered why and how they are being contacted by someone they do not know just before their existing phone contract is about to expire," said Graham in a statement. "We are considering the evidence with a view to prosecuting those responsible and I am keen to go much further and close down the entire unlawful industry in personal data."

InformationWeek has published an in-depth report on smartphone security. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-6651
Published: 2014-07-31
Multiple directory traversal vulnerabilities in the Vitamin plugin before 1.1.0 for WordPress allow remote attackers to access arbitrary files via a .. (dot dot) in the path parameter to (1) add_headers.php or (2) minify.php.

CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-3488
Published: 2014-07-31
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.

CVE-2014-3554
Published: 2014-07-31
Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.

CVE-2014-5171
Published: 2014-07-31
SAP HANA Extend Application Services (XS) does not encrypt transmissions for applications that enable form based authentication using SSL, which allows remote attackers to obtain credentials and other sensitive information by sniffing the network.

Best of the Web
Dark Reading Radio