https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Tech Services Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
    • Diversity, Equity & Inclusion
  • MSP 501
    • Back
    • MSP 501 Information Center
    • 2021 MSP 501 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2021 MSP 501
    • Circle of Excellence
    • DE&I 101
    • Top Gun 51
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Tech Services Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
    • Diversity, Equity & Inclusion
  • MSP 501
    • Back
    • MSP 501 Information Center
    • 2021 MSP 501 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2021 MSP 501
    • Circle of Excellence
    • DE&I 101
    • Top Gun 51
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Security


Shutterstock

Data breach notification

Latest T-Mobile Data Breach Has Some Wondering ‘How Lapsus$ Got Access in the First Place’

  • Written by Edward Gately
  • April 22, 2022
T-Mobile said the hackers didn't access any customer data.

T-Mobile has confirmed yet another data breach, this time by the Lapsus$ extortion gang, which used stolen credentials and gained access to internal systems.

Saying the hackers didn’t access any customer data, T-Mobile sent us the following statement:

“Several weeks ago, our monitoring tools detected a bad actor using stolen credentials to access internal systems that house operational tools software. The systems accessed contained no customer or government information or other similarly sensitive information. And we have no evidence that the intruder was able to obtain anything of value. Our systems and processes worked as designed, the intrusion was rapidly shut down and closed off, and the compromised credentials used were rendered obsolete.”

Brian Krebs first reported the breach after reviewing leaked Telegram chat messages between Lapsus$ members. He said while inside the mobile carrier’s network, the hackers were able to steal proprietary T-Mobile source code.

According to Bleeping Computer, T-Mobile has disclosed six other data breaches since 2018, including one where hackers accessed data belonging to 3% of its customers.

Last August, a data breach impacted more than 53 million T-Mobile customers. It prompted two class-action lawsuits against the carrier.

Lapsus$ also recently targeted Microsoft and Okta with data leaks.

Latest T-Mobile Breach Prompts Questions

Mark Lambert is vice president of products at ArmorCode, an application security provider.

ArmorCode's Mark Lambert

ArmorCode’s Mark Lambert

“While T-Mobile did a great job making sure the ‘intrusion was rapidly shut down and closed off,’ you must ask yourself how did they get access in the first place?” he said. “As organizations like T-Mobile race to deliver features to customers to gain competitive advantage, cracks appear in their security posture. Leveraging cloud with dynamically created container-based infrastructure enables organizations to instantaneously deploy and scale software delivery, but exponentially increases the volume of security findings that are from application security and infrastructure security tools. Organizations need to be leveraging AppSecOps practices as well as DevSecOps to operationalize application security and ensure that they can scale the team’s response to security findings to the same level they have scaled their software delivery.”

Tim Wade is deputy CTO at Vectra.

Vectra's Tim Wade

Vectra’s Tim Wade

“Unsurprisingly, stolen credentials continue to be a preferred method of compromise,” he said. “Perhaps what is surprising for many organizations is just how many risks exist around credentials and how often an inability to effectively gauge risks to their posture, or detect and respond when something goes awry gives an adversary an opportunity to step up to the batter’s box. With enough at-bats, adversaries will get on base. Organizations need to intentionally think long and hard at not only how they’ll manage risks on the front edge, but how they’ll uncover and expel an adversary post-compromise.”

Cyberattacks More Damaging, Complex

Arti Raman is CEO and founder of Titaniam, an endpoint management and security provider.

Titaniam's Arti Raman

Titaniam’s Arti Raman

“T-Mobile’s confirmation that the Lapsus$ extortion gang breached its network shows how much more damaging and complex cyberattacks have become as extortion attempts rise in popularity,” she said. “This highlights the importance of technologies like encryption-in-use, also known as data-in-use encryption, which specifically protect against data extortion.”

T-Mobile, which recently failed to buy back stolen data that was being ransomed, is just one example of how double extortion, and even triple extortion, cyberattacks are becoming commonplace, Raman said.

Not only do bad actors steal data for their own malicious usage, she said. They often try to increase their profits by taunting organizations about releasing the data publicly without a hefty payment. Moving to encryption-in-use provides unprecedented immunity.

Want to contact the author directly about this story? Have ideas for a follow-up article? Email Edward Gately or connect with him on LinkedIn.

 

Tags: Agents Mobility & Wireless SDN/SD-WAN Security Technologies

Most Recent


  • Sophos tip
    Microsoft Global Channel Chief Rodney Clark Makes Sudden Exit
    The unexpected departure takes place just one year after Clark took over the position.
  • Managed Security Services
    Palo Alto Networks, Deloitte Offering Managed Security Services
    Deloitte Cyber and Palo Alto Networks announced their strategic alliance last July.
  • Mergers and Acquisitions, MA
    11:11 Systems Snags Key Managed Service and Cloud Infrastructure Assets
    The two acquisitions add value to 11:11's cloud, connectivity and security platform and portfolio
  • North America
    Kaspersky Channel Vet Joins Cyware to Lead its North America Channel
    Cyware partners can expect improvements in the company's partner program.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Take the Reins
    Vector Capital Taking Reins of WatchGuard Technologies as Majority Owner
  • security stack efficacy
    Avaya Vet Dennis Kozak Switches to Cybersecurity as Ivanti's New COO
  • Words Opportunity Ahead on a road
    Transforming Headwinds Into Tailwinds
  • Earnings
    Microsoft Meets Expectations, Google's Alphabet Disappoints in Q1 Earnings

Upcoming Events

View all

Channel Partners Europe

June 14, 2022 - June 15, 2022

MSP Summit

September 13, 2022 - September 16, 2022

Galleries

View all

Unprecedented Times Impacting Cybersecurity Channel Partners

May 16, 2022

8 Channel People Making Waves This Week at Avant, Cisco, Databricks, More

May 13, 2022

Talent Shortage Ripple Effects Continue to Create Headaches for Partners

May 13, 2022

Industry Perspectives

View all

Build Customers for Life with CX and Lifecycle Selling

May 16, 2022

Voice Analytics Are a Must-Have as Companies Evolve COVID-Rushed Tech

May 12, 2022

Top 5 Trends and Challenges Channel Partners Are Facing in 2022

May 9, 2022

Webinars

View all

Simplifying SaaS Security for MSPs

April 27, 2022

How to Supercharge The Network to Support Your IT Superhero Moves

May 3, 2022

The 2022 MSP Challenge: Scale Service Delivery Despite the Talent Gap

April 21, 2022

White Papers

View all

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

The AT&T Cybersecurity Incident Response Toolkit

April 4, 2022

Channel Futures TV

View all

AT&T, Microsoft, Cisco, ThreatLocker on Unlocking Partner Potential

Agents Share ‘Secrets,’ Industry Opportunity

May 11, 2022

Vonage Addresses Potential Partner Opportunity via Acquisition by Ericsson

May 5, 2022

Lumen Technologies ‘Built for Growth and Scale’

May 4, 2022

Twitter

ChannelFutures

.@PaloAltoNtwks, @Deloitte expand alliance to offer #managedsecurity services. dlvr.it/SQVFrp https://t.co/7VFlXLFIEK

May 16, 2022
ChannelFutures

.@1111systems has snagged certain key managed service and cloud infrastructure assets through two key acquisitions.… twitter.com/i/web/status/1…

May 16, 2022
ChannelFutures

.@kaspersky vet to lead @CywareCo's North America channel. #cybersecurity dlvr.it/SQV5S3 https://t.co/2n9CZ4H6Ke

May 16, 2022
ChannelFutures

How to build and provide a great customer experience. #CX #ChannelPartners @IngramMicroInc dlvr.it/SQTrfh https://t.co/RsAA2Lliek

May 16, 2022
ChannelFutures

[email protected] global channel chief Rodney Clark made the surprise announcement he is leaving his position just one ye… twitter.com/i/web/status/1…

May 16, 2022
ChannelFutures

.@SAP touts growth of Rise with SAP at #SAPSapphireOrlando dlvr.it/SQTCs5 https://t.co/J2LrQrYlNQ

May 16, 2022
ChannelFutures

#CPExpo #cybersecurity roundtable discusses unprecedented times for channel chiefs, partners. @Sophos, @Fortinet,… twitter.com/i/web/status/1…

May 16, 2022
ChannelFutures

Being #cybersecurity proactive about the threat landscape makes a better #cloudcomputing strategy, says… twitter.com/i/web/status/1…

May 16, 2022

MSSP Insider

Business advice for MSSPs and news from the broader security channel.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X