When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Some of the commands used matched indicators of compromise previously linked to Salt Typhoon, he added.
This is not the case at T-Mobile," Simon said.
Bad actors had no access to sensitive customer data (including calls, voicemails, or texts).
Simon also said that the attack originated from a wireline providers connection that was connected to T-Mobile.
In any case, the information was shared with government and industry partners.