A group of employees in a T-Mobile store in New York.
Image Credits:Alexi Rosenfeld (opens in a new window) / Getty Images

Lapsus$ hackers targeted T-Mobile source code in latest data breach

The Lapsus$ hacking group has claimed another victim: U.S. telecom giant T-Mobile.

T-Mobile’s latest security incident — the seventh data breach in the past four years — was first revealed by security journalist Brian Krebs, who obtained a week’s worth of private chat messages between the core members of Lapsus$, a hacking and extortion group that gained notoriety in recent months after targeting tech giants Nvidia, Ubisoft and Okta. The messages obtained by Krebs were sent in a private Telegram channel during the week leading up to the arrests of the gang’s most active members in March. At least two Lapsus$ members — a 16-year-old and a 17-year-old — were subsequently charged with multiple cyber offenses.

The messages show that Lapsus$ had access to T-Mobile’s network by compromising employee accounts, either by buying leaked credentials or through social engineering. This gave Lapsus$ access to T-Mobile’s internal tools, including Atlas, used for managing customer accounts, which the hackers used in an attempt to find T-Mobile accounts associated with the FBI and Department of Defense, but were blocked as the access needed additional checks.

Through this employee account access, the hackers were in a position to carry out SIM-swap attacks, where hackers reassign a target’s cell phone number to a device under their control, which then allows for the interception of phone calls and text messages that can be used to further break into a victim’s accounts and also obtain two-factor authentication codes.

T-Mobile did not respond to multiple requests for comment, but told news outlets that “no customer or government information” was accessed during the incident.

However, Krebs reports that the hackers were able to steal source code for a range of company projects — just as the group had done with Samsung, Microsoft and Globant.

“Several weeks ago, our monitoring tools detected a bad actor using stolen credentials to access internal systems that house operational tools software,” the company’s statement said. “Our systems and processes worked as designed, the intrusion was rapidly shut down and closed off, and the compromised credentials used were rendered obsolete.”

Techcrunch event

Join 10k+ tech and VC leaders for growth and connections at Disrupt 2025

Netflix, Box, a16z, ElevenLabs, Wayve, Hugging Face, Elad Gil, Vinod Khosla — just some of the 250+ heavy hitters leading 200+ sessions designed to deliver the insights that fuel startup growth and sharpen your edge. Don’t miss the 20th anniversary of TechCrunch, and a chance to learn from the top voices in tech. Grab your ticket before doors open to save up to $444.

Join 10k+ tech and VC leaders for growth and connections at Disrupt 2025

Netflix, Box, a16z, ElevenLabs, Wayve, Hugging Face, Elad Gil, Vinod Khosla — just some of the 250+ heavy hitters leading 200+ sessions designed to deliver the insights that fuel startup growth and sharpen your edge. Don’t miss a chance to learn from the top voices in tech. Grab your ticket before doors open to save up to $444.

San Francisco | October 27-29, 2025

T-Mobile has confirmed six other, previous data breaches since 2018. Last August, the telecom giant admitted that at least 47 million customers had account data stolen as a massive data breach. Hackers accessed personal data belonging to 7.8 million current postpaid customers, including dates of birth and Social Security, and also hackers accessed the records of 40 million former and prospective customers.

T-Mobile says at least 47M current and former customers affected by hack

Topics

, , , , , , , , , , , , ,
Loading the next article
Error loading the next article