Jump to content

T-Mobile Austria Confirms They Stores All Customer Passwords In Clear Text - UPDATED

LAwLz

Update:

 

 

So it is not quite as bad as storing the passwords in clear text, however it is still very problematic because:

1) The passwords are encrypted. This means that if the case of a security breach, the attacker just needs to find the encryption key and it will have access to all passwords in clear text.

The proper way of storing passwords is as salted hashes. For more info, see this video called "How NOT to Store Passwords!".

 

2) They still allow the staff to see parts of the users password.

 

 

 

 

 

Original post:

 

 

So this is fun...

T-Mobile Austria's twitter account announced that they are storing all customer passwords in clear text. Not only that, but they also allow their customer service staff to see the first four characters of it.

 

When told that this was very bad security practice, T-Mobile's response was:

Quote

image.png.9dd860b47c75a3ee9e67d8144ad7e435.png

And when another user chimed in, saying that in the case of a data breach all the users information including the passwords would be completely visible, T-Mobile replied with:

Quote

image.png.1c00eda0dcb129e241b5b6e13d1d1924.png

 

Actually, the entire twitter thread is crazy.

You can read the original here, or look at this screenshot below (because I suspect T-mobile will remove it soon)

 

Spoilers because the image is big.

Spoiler

5ac7e110eb104_t-mobilepasswordscleartext.thumb.png.490b8fab5b44f1e19a99c5315de22dc4.png

 

As the twitter users points out, T-Mobile Austria is not a subsidiary of T-Mobile (USA). However, both T-Mobile Austria and T-Mobile (USA) are owned by the same company, Deutsche Telekom AG. Telekom also stores their passwords in clear text. So if the parent company does it (Telekom), and one of the daughter companies does it (T-mobile Austria), then it is not too far fetched to assume other daughter companies (T-Mobile USA) does it too.

 

I don't know what is worse. The complete incompetence of whoever implemented their password system, or the terrible ignorance and naivety of their twitter support staff.

Link to comment
Share on other sites

Link to post
Share on other sites

All the more reason for to me not use them...

 

Honestly, what is with company security?

Quote or tag me( @Crunchy Dragon) if you want me to see your reply

If a post solved your problem/answered your question, please consider marking it as "solved"

Community Standards // Join Floatplane!

Link to comment
Share on other sites

Link to post
Share on other sites

This isn't just TMobile Australia, this is TMobile in general tbh

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, LAwLz said:

So this is fun...

 

Yes. I fell of my chair because of all the laughing. xD

 

I knew you didn't need any qualifications but come one. This poor woman isn't even able to rub her two brain cells together. She just failed the 1+1=2 test. :P

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, SC2Mitch said:

This isn't just TMobile Australia, this is TMobile in general tbh

It is T-Mobile Austria that explicitly admitted it (and even defended it... with the best arguments ever :P), but yes, the question is how extended this practice is in companies we don't have confirmation either way.

If I remember correctly, when Equifax happened there were several instances of comparable "non-state of the art" practices involved.

Link to comment
Share on other sites

Link to post
Share on other sites

I am not sure how this is possible since I work for Croatian Telemom (which is owned by DT, it is T-Com and T-Mobile put together, a subsidiary), and we can see literally nothing. For pretty much every app you can just type in a new password abut can't see anything other than *******, if even that much. I am really curious where that plain text is supposed to be located. Then again, every DT subsidiary does have it's rules from DT but also has it's own corporate security policy afaik. 

 

Either way, that twitter staff is incompetent at their job.

The ability to google properly is a skill of its own. 

Link to comment
Share on other sites

Link to post
Share on other sites

17 minutes ago, Crunchy Dragon said:

All the more reason for to me not use them...

 

Honestly, what is with company security?

Security costs money and we can't have companies spending money that interferes with profit

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to comment
Share on other sites

Link to post
Share on other sites

Reading that honestly made my security+ cert cry....Just why.?

WINDOWS HAS NOT DETECTED A KEYBOARD

PLEASE PRESS 'F1' TO CONTINUE OR 'F2' TO ABORT.

Link to comment
Share on other sites

Link to post
Share on other sites

Oh, forgot to mention but another company that has crap security is American Express who doesn't enforce case sensitivity for passwords

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to comment
Share on other sites

Link to post
Share on other sites

25 minutes ago, LAwLz said:

Actually, the entire twitter thread is crazy.

1

Holy shit. The twitter discussion is even better than your quotes. xD

 

Thanks for sharing mate! I already shared it with my fellow computer science students. xD

Link to comment
Share on other sites

Link to post
Share on other sites

Why? who would think this was a good idea. even LTT forum passwords are salted and hashed. 

Good luck, Have fun, Build PC, and have a last gen console for use once a year. I should answer most of the time between 9 to 3 PST

NightHawk 3.0: R7 5700x @, B550A vision D, H105, 2x32gb Oloy 3600, Sapphire RX 6700XT  Nitro+, Corsair RM750X, 500 gb 850 evo, 2tb rocket and 5tb Toshiba x300, 2x 6TB WD Black W10 all in a 750D airflow.
GF PC: (nighthawk 2.0): R7 2700x, B450m vision D, 4x8gb Geli 2933, Strix GTX970, CX650M RGB, Obsidian 350D

Skunkworks: R5 3500U, 16gb, 500gb Adata XPG 6000 lite, Vega 8. HP probook G455R G6 Ubuntu 20. LTS

Condor (MC server): 6600K, z170m plus, 16gb corsair vengeance LPX, samsung 750 evo, EVGA BR 450.

Spirt  (NAS) ASUS Z9PR-D12, 2x E5 2620V2, 8x4gb, 24 3tb HDD. F80 800gb cache, trueNAS, 2x12disk raid Z3 stripped

PSU Tier List      Motherboard Tier List     SSD Tier List     How to get PC parts cheap    HP probook 445R G6 review

 

"Stupidity is like trying to find a limit of a constant. You are never truly smart in something, just less stupid."

Camera Gear: X-S10, 16-80 F4, 60D, 24-105 F4, 50mm F1.4, Helios44-m, 2 Cos-11D lavs

Link to comment
Share on other sites

Link to post
Share on other sites

I literally have tears in my eyes while reading the twitter discussion.

Link to comment
Share on other sites

Link to post
Share on other sites

25 minutes ago, Teddy07 said:

The amazing part is that she even thinks that any non-federal or non-government-contracting company has amazing data protection xDxD

FTFY xD 

Sorry for the mess!  My laptop just went ROG!

"THE ROGUE":  ASUS ROG Zephyrus G15 GA503QR (2021)

  • Ryzen 9 5900HS
  • RTX 3070 Laptop GPU (80W)
  • 24GB DDR4-3200 (8+16)
  • 2TB SK Hynix NVMe (boot) + 2TB Crucial P2 NVMe (games)
  • 90Wh battery + 200W power brick
  • 15.6" 1440p 165Hz IPS Pantone display
  • Logitech G603 mouse + Logitech G733 headset

"Hex": Dell G7 7588 (2018)

  • i7-8750H
  • GTX 1060 Max-Q
  • 16GB DDR4-2666
  • 1TB SK Hynix NVMe (boot) + 2TB Crucial MX500 SATA (games)
  • 56Wh battery + 180W power brick
  • 15.6" 1080p 60Hz IPS display
  • Corsair Harpoon Wireless mouse + Corsair HS70 headset

"Mishiimin": Apple iMac 5K 27" (2017)

  • i7-7700K
  • Radeon Pro 580 8GB (basically a desktop R9 390)
  • 16GB DDR4-2400
  • 2TB SSHD
  • 400W power supply (I think?)
  • 27" 5K 75Hz Retina display
  • Logitech G213 keyboard + Logitech G203 Prodigy mouse

Other tech: Apple iPhone 14 Pro Max 256GB in White, Sennheiser PXC 550-II, Razer Hammerhead earbuds, JBL Tune Flex earbuds, OontZ Angle 3 Ultra, Raspberry Pi 400, Logitech M510 mouse, Redragon S113 keyboard & mouse, Cherry MX Silent Red keyboard, Cooler Master Devastator II keyboard (not in use), Sennheiser HD4.40BT (not in use)

Retired tech: Apple iPhone XR 256GB in Product(RED), Apple iPhone SE 64GB in Space Grey (2016), iPod Nano 7th Gen in Product(RED), Logitech G533 headset, Logitech G930 headset, Apple AirPods Gen 2 and Gen 3

Trash bin (do not buy): Logitech G935 headset, Logitech G933 headset, Cooler Master Devastator II mouse, Razer Atheris mouse, Chinese off-brand earbuds, anything made by Skullcandy

Link to comment
Share on other sites

Link to post
Share on other sites

That twitter thread made me cringe

Insanity is not the absence of sanity, but the willingness to ignore it for a purpose. Chaos is the result of this choice. I relish in both.

Link to comment
Share on other sites

Link to post
Share on other sites

34 minutes ago, Lurick said:

Security costs money and we can't have companies spending money that interferes with profit

But plaintext really?

When I was in school even people who knew nothing about security or programming would at least XOR the password with a hard coded value (terrible yes) so if the database were to be compromised it wouldn't be immediately shown what the contents were.

 

Quote

You have so many passwords for evey app, for every mail-account and so on.

I'm sure all normal consumers use unique, complex passwords and don't store then in an unencrypted text file...

 

Edit: Did they explicitly say the passwords were stored entirely in plain text or only the first 4 characters? Storing the first 4 characters would allow verification in a poor way while hashing the actual password.

Link to comment
Share on other sites

Link to post
Share on other sites

haha! April Fools was 6 days ago....guess someone didn't tell them...

 

pls be fake

Our Grace. The Feathered One. He shows us the way. His bob is majestic and shows us the path. Follow unto his guidance and His example. He knows the one true path. Our Saviour. Our Grace. Our Father Birb has taught us with His humble heart and gentle wing the way of the bob. Let us show Him our reverence and follow in His example. The True Path of the Feathered One. ~ Dimboble-dubabob III

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Crunchy Dragon said:

Honestly, what is with company security?

My company has pretty good security.

 

Everything sensitive is paper copy only or on an external drive that has never, and will never, be used on a computer with any network access.

 

In a fire safe.

 

Guarded by a fairly vicious dog.

 

And occasionally, a guy with a gun.

Come Bloody Angel

Break off your chains

And look what I've found in the dirt.

 

Pale battered body

Seems she was struggling

Something is wrong with this world.

 

Fierce Bloody Angel

The blood is on your hands

Why did you come to this world?

 

Everybody turns to dust.

 

Everybody turns to dust.

 

The blood is on your hands.

 

The blood is on your hands!

 

Pyo.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×