Mint Mobile discloses new data breach exposing customer data

return2ozma@lemmy.world to Technology@lemmy.world – 340 points –
Mint Mobile discloses new data breach exposing customer data
bleepingcomputer.com
47

T-Mobile owned companies and data breaches. Can you name a better duo?

I feel like Target has to be giving T-Mobile a run for their money in this field. It seems like I'm reading about a new Target data breach at least every other year.

Fuckin great. I ran out of hotspot like a month ago while working remotely on a road trip. I needed hotspot right then /there, and my phone is on a family plan. Increasing my hotspot data meant I had to do it for the whole family plan and pay almost double the amount on the monthly bill. I thought I outsmarted the system by getting a mint mobile 3 month subscription for like $40 to just use for that trip... Aaaaaand my data's been breached... Cool..

The screenshot in the article said the reach was a few months old, last July.

I jumped ship to another carrier right after they were bought out by T-Mobile and I've dodged price hikes and now data breaches. T-Mobile just ruins everything they touch.

Price hikes? I just renewed for $250 for a year. I don't remember the exact price I paid the year before, but $250 is still incredibly cheap compared to most, isn't it?

My wife has been with Mint for 5 years now and there have not been any increases to her plan, on the contrary, they increased the data allowance in her tier

The numbers is the entire reason I remain with Mint. I liked Mint. T-mobile isn't a company I'd like to do business with and will switch away the moment I see an increase if there's a better offer elsewhere.

I've been with them for something like 7 years now. Started with 1gb of data, and now I get 4gb. I've never changed price tier as well. Over all really great service, bummer about the breach though.

Hmm, I think I might be mistaken on that then. I remember them announcing that they were nixing the $15 plan (which a couple of my family members were on), but it's still there. Maybe they reverted it, or it was just Reddit spreading nonsense information. I'll edit my comment.

Eh, I have my folks on t-mo's $15/each for 3.5gb/unl/unl plan. My second line is with tello for $6/mo. $25/mo is cheap compared to my at&t business postpaid plan (phone + laptop + watch for ~$130 out the door), but if I wasn't going for features, I'd be right there with them for the $15 plan. I'd even go both lines from tello, but the difference between tmo qci6 and qci7 is brutal in my area, and often means data becomes completely unusable during the day. Over-subscribed towers. So t-mo MVNOs are a nogo for me, thus $15.

Jumped to where if you don't mind my asking?

Tello. The service and price have been basically the same as pre-acquisition Mint. They also use T-Mobile's network but are not owned by them (...for now, at least.)

Tello (and all* [except Google Fi's flex plan, and their most expensive plan] tmo MVNOs) run at qci7, or one peg below tmo direct customers* (except tmo essentials and those who go over their 'high speed data cap', which are at qci9 or 'the back of the bus'). This can mean virtually nothing in some areas, or it can mean that the tower you are on is so over subscribed/at capacity so hard that data becomes non-existant.

I have tello as a second line, where data isn't important. But my home area falls under the 'data is non-existant' category during the day, which is why they are my second line.

Just be cautious.

These kinds of plans work great for when you are on Wi-Fi 99% of the time and you just need it for the 1%.

What makes you so sure they didn't retain your data?

There's chance they did, but I didn't get any kind of announcement email about it. I also used an email alias for my old Mint account, so if I suddenly start getting spam emails to that address, I'll have my answer, lol

When the merger was first announced, my friend sent me a link to the Ryan Reynolds video of the announcement. I sent back, "cute vid. I sense a breach in our future lol"

I guess that 'lol' wasn't necessary...

I guess that β€˜lol’ wasn’t necessary…

Everyone deals with pain differently

Is it just me or has 2023 been the year of the data breach? Maybe they are just larger or more widely reported. Just seems like there have been a fuck-ton of them this past year.

Hackers-for-hire on the darkweb is big business these days

While true, I'm not convinced that fully explains it. Having been in IT nearly 2 decades I feel like the second piece is cybersecurity budgets getting slashed. A lot of them have been super-basic shit like someone clicking on a malicious link.

Yeah, some youtube videos that cover basics and hiring a firm after a breech is pretty standard it feels.

Oh for sure, didnt mean to imply it was the only reason.

Spearphishing high-value targets, or even just phishing a company's email roster are very very common practices because they yield significant results.

Theres also the "insurance approach" to cybersecurity, where its cheaper to run PR for a little while and/or take out insurance policies against cyber attacks such as ransomware. The latter is a key factor as to why many companies dont mind paying the ransom at all.

I bet 2024 will have more. More stuff is online and we don't seem to be getting any better at securing it.

I don't think the problem is "we" securing things (we being cybersecurity professionals). I think the problem is companies seeing that it's cheaper to take the PR hit, pay the ransom, pay for cybersecurity insurance, etc than it is to pay for a properly secured network.

Cybersecurity is hard (citation needed) and costs a lot of money (citation needed). If a company figures it's cheaper to have a breach and deal with the fallout than it is to properly secure shit I can promise you what will happen.

As always, follow the $$$.

Profit > Security. These companies don't care so long as the consequences don't affect profit significantly enough. Infosec is always an afterthought, if considered at all.

1 more...
1 more...

"Once they gain access to the number, they can try to access the user's online accounts by performing password resets and receiving the OTP codes to get past multi-factor authentication."

Mint - "Can't bypass multi-factor authentication when you never implemented multi-factor authentication!"

Not sure when they added it but immediately after seeing this post I hit my account to change my password and confirmed Mint does offer 2FA using auth apps (I used Google Authenticator) so I activated it.

I expect this to replace the SMS codes they'd been sending me before and hopefully prevent what you're describing.

Would be nice if these big firms would stop serving us the breach du jour.

I switched to US Mobile a couple months ago and it has been a much better experience.

I thought they meant Linux Mint, the Debian derivative. Very confused until I read the comments.. perhaps I should read the article 😳

Fuck but I do have totp already enabled should I just change my password?

Edit: my paranoia got to me I'm gonna just reset my totp seeds and change my password. Some of the info was fake so that'll protect me a bit. Guess that's the best you can do for now

Edit 2: they made it a pain in the ass to change your password apparently now they favor only 20 characters max (rip my 35 character password). A nice warning on their website would've been really helpful

Edit 2: they made it a pain in the ass to change your password apparently now they favor only 20 characters max (rip my 35 character password).

That just screams they're not storing passwords properly. If you're salt+hashing your passwords, they could throw Hamlet into the password field and the only limit is how big the text entry field can be. The output is a fixed length string, so I put length should be immaterial.

I got off mint last month so at the very least they cant port my number off when the number is no longer with them anymore.

If I never got the email, does that mean I wasn't effected?