In our industry, when issues continue regardless of impact, we usually go back to the drawing board.
Sprint had a series of issues last year and this is a another in a list of success attacks on T-Mobile. In this particular case, one has to wonder if it is related to the merging of two titans. Mobile phishing represents one of the biggest security blind spots for individuals and enterprise security teams alike. Since it can be incredibly difficult to identify phishing attempts on smartphones and tablets, it’s more important than ever to have mobile phishing protection on all of your mobile devices.”īrandon Hoffman, Chief Information Security Officer at Netenrich, a San Jose, Calif.-based provider of IT, cloud, and cybersecurity operations and services, notes, “The volume of attacks and successful attacks against wireless carriers continues to rise. Schless adds, "The attacker can pretend to be T-Mobile support over voice or text in order to get customers to share their login credentials. Since customers know there was a recent security incident, they may not think twice before engaging with an individual who claims they can help. If this were successful and the attacker made their way into the customer’s account, they could have access to sensitive information associated with the account.
Hank Schless, Senior Manager, Security Solutions at Lookout, a San Francisco, Calif.-based provider of mobile security solutions, says, “While it appears that the attackers weren’t able to collect any highly sensitive personal data of T-Mobile customers, there is still risk posed to those whose phone numbers were stolen in the breach. An area code is all an attacker needs to carry out a socially engineered mobile phishing attack. Lookout discovered a mobile phishing campaign in February 2020 that associated area codes with popular banks in the area to try to phish mobile banking login credentials." In 2018, T-Mobile admitted hackers had breached its email systems, exposing names, billing zip codes, phone numbers, email addresses, account numbers and account types. In March 2020, the company also disclosed a security breach, affecting employee email accounts and user data. T-Mobile also notified federal law enforcement as well as impacted customers. The cell carrier noted it had started an investigation as soon as the hack was discovered, with assistance from cybersecurity forensics experts, to determine what happened and what information was involved.
“We’ve confirmed that matchmaking has been restored,” confirmed Respawn an hour later, once the patch had hit servers around the world.
The devs quickly worked on a fix to restore matchmaking to its original form, without the hacked playlist.Īfter various tests, a server update began to roll out at 6PM PT on July 4. What began as a simple ‘investigation’ into the situation at hand, took more than six hours of hard work to resolve.
Respawn first responded to the incident hours later on Twitter.
Weeks of work required to address each new stupid thing. The situation affecting the Titanfall games right now is so frustrating. Why use your talent to tear communities apart? I wish all the hackers/cheaters/malicious actors who ruin games would find more fulfilling hobbies. However, Respawn is in a constant battle, taking “weeks of work” to address “each new stupid thing” that the hackers do to ruin the classic FPS game.