Hackers Claim To Hit T-Mobile Hard 302
dasButcher writes "Hackers are
claiming to own T-Mobile USA's servers and to have access to the cellular phone carrier's operations, finance and subscriber data." (Here's the seclists.org post of the claimed breach.)
worthless data! (Score:1, Funny)
They're in luck! (Score:5, Funny)
I happen to know a Nigerian Prince who would be *very* interested in their offer.
All UNIX/UNIX-likes (Score:5, Funny)
All of their production servers are running UNIX- or UNIX-like operating systems. Had they been running a Windows-only setup, this would not have happened.
Ever heard of a high-profile Windows shop being compromised during the last five years? No? Didn't think so.
Re:All UNIX/UNIX-likes (Score:5, Funny)
You do realize you can register for free Steve, right?
Re:Why.... (Score:4, Funny)
I emailed them with my very serious offer. And from another account asking them to plz send me teh codez. No response yet :(
Re:All UNIX/UNIX-likes (Score:5, Funny)
Ever heard of a high-profile Windows shop being compromised during the last five years? No? Didn't think so.
Of course we don't hear about it anymore. It's not news!
Re:Why.... (Score:4, Funny)
Who said it was not encrypted?
Yes, they used CSS encryption but those damn hackers broke the law and circumvented it using something called DeCSS...
When is the government going to put a stop to this sort of thing and protect us!
Re:nice! (Score:5, Funny)
Does this mean service will improve?
Re:Why is this a story? (Score:3, Funny)
Come on, how is your gibberish any different from the rest of Slashdot?
Re:All UNIX/UNIX-likes (Score:2, Funny)
Register now! And win FIVE CHAIRS to throw through the window. For a small additional fee we provide a stupid employee to throw the chairs at!
ACT NOW! CALL 1-800-STEVEB
Re:Why.... (Score:5, Funny)
It seems your theory is kind of flawed, because if their protection was indeed that good the thieves probably wouldn't have gotten the data they did.
I think your assumption that "the theives did get data" is premature. I am not seeing corroborative data anywhere.
Speaking of which, based upon analyzing the deleted video files on your primary partition, you should get the old lady a membership at the local gym or something. :P
Hmmmmm.... (Score:5, Funny)
Now's my chance to call all those phone-sex lines I've always been curious about!
Sir, you owe $15,239 and 33 cents.
"But I never made those calls!?! You people got hacked last month, didn't you? They must have stolen my info!"
Oh, that's right. Alright sir, we'll take care of it. Uhmmm...by the way, sir? I can barely hear you. Why do you sound so far away?
"Oh, I can't hold my phone. I uhhh...I sprained my wrists."
Yeah...right (Score:5, Funny)
Anyone who does not have the wherewithal and sense to not make public their extortion demand, very likely does not have the sense and wherewithal to actually harvest information. I see a text depiction of a list of alleged connections to T-Mo servers.
I do not see actual data - show me a 500 data item sample if you have anything at all.
My best guess: Some 15 year old in an Eastern European country will shortly have some 'splainin to do.
Re:Using the data for good purposes (Score:1, Funny)
in that case, i know someone at Microsoft who has TWO copies of the data. /waits for raid