• atmur@lemmy.world
      link
      fedilink
      English
      arrow-up
      32
      ·
      11 months ago

      Also probably password hashes.

      The company did not make it clear from this statement if hashed passwords were accessed by the attacker.

      I don’t expect good news if they chose not to share that detail.

      • Chozo@kbin.social
        link
        fedilink
        arrow-up
        14
        ·
        11 months ago

        I’m pretty sure they’re required to disclose that, and since they’re already publicly admitting to some breaches, I doubt they’d be trying to hide parts of it while they’re already likely being looked into.

        It sounds like the data that was gathered is the sort of data that a customer support rep should have access to. They typically can only see pertinent details like what is necessary to verify a customer’s identity and their device details, which lines up with what was mentioned in the disclosure. I imagine some CSR probably got their work account phished or something.

        Passwords are probably just fine, from the looks of things.

      • Billy_Gnosis@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        11 months ago

        All that the email I received from them said was that they fixed the problem and there was nothing further I needed to do.

      • JJROKCZ@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        11 months ago

        They are required to disclose if that happened or they believe it happened. If they’re not saying it happened then they believe the password are fine at the time of announcement

  • Raiderkev@lemmy.world
    link
    fedilink
    English
    arrow-up
    37
    ·
    11 months ago

    Fuckin great. I ran out of hotspot like a month ago while working remotely on a road trip. I needed hotspot right then /there, and my phone is on a family plan. Increasing my hotspot data meant I had to do it for the whole family plan and pay almost double the amount on the monthly bill. I thought I outsmarted the system by getting a mint mobile 3 month subscription for like $40 to just use for that trip… Aaaaaand my data’s been breached… Cool…

  • atmur@lemmy.world
    link
    fedilink
    English
    arrow-up
    37
    arrow-down
    5
    ·
    edit-2
    11 months ago

    I jumped ship to another carrier right after they were bought out by T-Mobile and I’ve dodged price hikes and now data breaches. T-Mobile just ruins everything they touch.

    • essteeyou@lemmy.world
      link
      fedilink
      English
      arrow-up
      18
      ·
      11 months ago

      Price hikes? I just renewed for $250 for a year. I don’t remember the exact price I paid the year before, but $250 is still incredibly cheap compared to most, isn’t it?

      • criticon@lemmy.ca
        link
        fedilink
        English
        arrow-up
        19
        ·
        11 months ago

        My wife has been with Mint for 5 years now and there have not been any increases to her plan, on the contrary, they increased the data allowance in her tier

        • henfredemars@infosec.pub
          link
          fedilink
          English
          arrow-up
          11
          ·
          11 months ago

          The numbers is the entire reason I remain with Mint. I liked Mint. T-mobile isn’t a company I’d like to do business with and will switch away the moment I see an increase if there’s a better offer elsewhere.

        • Jayb151@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          11 months ago

          I’ve been with them for something like 7 years now. Started with 1gb of data, and now I get 4gb. I’ve never changed price tier as well. Over all really great service, bummer about the breach though.

      • atmur@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        11 months ago

        Hmm, I think I might be mistaken on that then. I remember them announcing that they were nixing the $15 plan (which a couple of my family members were on), but it’s still there. Maybe they reverted it, or it was just Reddit spreading nonsense information. I’ll edit my comment.

      • wreckedcarzz@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        edit-2
        11 months ago

        Eh, I have my folks on t-mo’s $15/each for 3.5gb/unl/unl plan. My second line is with tello for $6/mo. $25/mo is cheap compared to my at&t business postpaid plan (phone + laptop + watch for ~$130 out the door), but if I wasn’t going for features, I’d be right there with them for the $15 plan. I’d even go both lines from tello, but the difference between tmo qci6 and qci7 is brutal in my area, and often means data becomes completely unusable during the day. Over-subscribed towers. So t-mo MVNOs are a nogo for me, thus $15.

      • atmur@lemmy.world
        link
        fedilink
        English
        arrow-up
        15
        ·
        11 months ago

        Tello. The service and price have been basically the same as pre-acquisition Mint. They also use T-Mobile’s network but are not owned by them (…for now, at least.)

        • 𝕸𝖔𝖘𝖘@infosec.pub
          link
          fedilink
          English
          arrow-up
          8
          ·
          11 months ago

          I wasn’t aware of their existence. Thank you. I see they’re slightly less expensive than tmo’s mint and don’t require bulk buys, so that’s nice.

        • wreckedcarzz@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          11 months ago

          Tello (and all* [except Google Fi’s flex plan, and their most expensive plan] tmo MVNOs) run at qci7, or one peg below tmo direct customers* (except tmo essentials and those who go over their ‘high speed data cap’, which are at qci9 or ‘the back of the bus’). This can mean virtually nothing in some areas, or it can mean that the tower you are on is so over subscribed/at capacity so hard that data becomes non-existant.

          I have tello as a second line, where data isn’t important. But my home area falls under the ‘data is non-existant’ category during the day, which is why they are my second line.

          Just be cautious.

          • Rolder@reddthat.com
            link
            fedilink
            English
            arrow-up
            1
            ·
            11 months ago

            These kinds of plans work great for when you are on Wi-Fi 99% of the time and you just need it for the 1%.

      • atmur@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        11 months ago

        There’s chance they did, but I didn’t get any kind of announcement email about it. I also used an email alias for my old Mint account, so if I suddenly start getting spam emails to that address, I’ll have my answer, lol

  • 𝕸𝖔𝖘𝖘@infosec.pub
    link
    fedilink
    English
    arrow-up
    23
    ·
    edit-2
    11 months ago

    When the merger was first announced, my friend sent me a link to the Ryan Reynolds video of the announcement. I sent back, “cute vid. I sense a breach in our future lol”

    I guess that ‘lol’ wasn’t necessary…

  • jordanlund@lemmy.world
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    1
    ·
    11 months ago

    “Once they gain access to the number, they can try to access the user’s online accounts by performing password resets and receiving the OTP codes to get past multi-factor authentication.”

    Mint - “Can’t bypass multi-factor authentication when you never implemented multi-factor authentication!”

    • Taztrophe@kbin.social
      link
      fedilink
      arrow-up
      7
      ·
      11 months ago

      Not sure when they added it but immediately after seeing this post I hit my account to change my password and confirmed Mint does offer 2FA using auth apps (I used Google Authenticator) so I activated it.

      I expect this to replace the SMS codes they’d been sending me before and hopefully prevent what you’re describing.

      Would be nice if these big firms would stop serving us the breach du jour.

  • 0110010001100010@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    ·
    11 months ago

    Is it just me or has 2023 been the year of the data breach? Maybe they are just larger or more widely reported. Just seems like there have been a fuck-ton of them this past year.

      • 0110010001100010@lemmy.world
        link
        fedilink
        English
        arrow-up
        11
        ·
        11 months ago

        While true, I’m not convinced that fully explains it. Having been in IT nearly 2 decades I feel like the second piece is cybersecurity budgets getting slashed. A lot of them have been super-basic shit like someone clicking on a malicious link.

        • CaptainSpaceman@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          11 months ago

          Oh for sure, didnt mean to imply it was the only reason.

          Spearphishing high-value targets, or even just phishing a company’s email roster are very very common practices because they yield significant results.

          Theres also the “insurance approach” to cybersecurity, where its cheaper to run PR for a little while and/or take out insurance policies against cyber attacks such as ransomware. The latter is a key factor as to why many companies dont mind paying the ransom at all.

    • sbv@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      4
      ·
      11 months ago

      I bet 2024 will have more. More stuff is online and we don’t seem to be getting any better at securing it.

      • 0110010001100010@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        ·
        11 months ago

        I don’t think the problem is “we” securing things (we being cybersecurity professionals). I think the problem is companies seeing that it’s cheaper to take the PR hit, pay the ransom, pay for cybersecurity insurance, etc than it is to pay for a properly secured network.

        Cybersecurity is hard (citation needed) and costs a lot of money (citation needed). If a company figures it’s cheaper to have a breach and deal with the fallout than it is to properly secure shit I can promise you what will happen.

        As always, follow the $$$.

    • BoofStroke@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      2
      ·
      11 months ago

      Profit > Security. These companies don’t care so long as the consequences don’t affect profit significantly enough. Infosec is always an afterthought, if considered at all.

  • martinb@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    11 months ago

    I thought they meant Linux Mint, the Debian derivative. Very confused until I read the comments… perhaps I should read the article 😳

  • Dudewitbow@lemmy.zip
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    11 months ago

    I got off mint last month so at the very least they cant port my number off when the number is no longer with them anymore.

  • Extras@lemmy.today
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    11 months ago

    Fuck but I do have totp already enabled should I just change my password?

    Edit: my paranoia got to me I’m gonna just reset my totp seeds and change my password. Some of the info was fake so that’ll protect me a bit. Guess that’s the best you can do for now

    Edit 2: they made it a pain in the ass to change your password apparently now they favor only 20 characters max (rip my 35 character password). A nice warning on their website would’ve been really helpful

    • Unaware7013@kbin.social
      link
      fedilink
      arrow-up
      3
      ·
      11 months ago

      Edit 2: they made it a pain in the ass to change your password apparently now they favor only 20 characters max (rip my 35 character password).

      That just screams they’re not storing passwords properly. If you’re salt+hashing your passwords, they could throw Hamlet into the password field and the only limit is how big the text entry field can be. The output is a fixed length string, so I put length should be immaterial.