{
	"id": "4a46797e-ab04-45dc-a583-2a51fd24d664",
	"created_at": "2026-04-06T01:31:15.212688Z",
	"updated_at": "2026-04-10T03:20:24.485391Z",
	"deleted_at": null,
	"sha1_hash": "d6b4c8389926a42da15b407a0941c0ba9130d7fd",
	"title": "UScellular discloses data breach after billing system hack",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 760492,
	"plain_text": "UScellular discloses data breach after billing system hack\r\nBy Sergiu Gatlan\r\nPublished: 2022-01-04 · Archived: 2026-04-06 01:01:04 UTC\r\nUScellular, self-described as the fourth-largest wireless carrier in the US, has disclosed a data breach after the company's\r\nbilling system was hacked in December 2021.\r\nThe mobile carrier said in data breach notification letters sent to 405 impacted individuals that the attackers also ported\r\nsome of the affected customers' numbers using personal information stolen in the incident.\r\n\"On December 13, 2021, UScellular detected a data security incident in 'which unauthorized individuals illegally accessed\r\nour billing system and gained access to wireless customer accounts that contain personal information,\" the carrier explained.\r\nhttps://www.bleepingcomputer.com/news/security/uscellular-discloses-data-breach-after-billing-system-hack/\r\nPage 1 of 4\n\nhttps://www.bleepingcomputer.com/news/security/uscellular-discloses-data-breach-after-billing-system-hack/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\n\"Unauthorized individuals attempted to leverage access to that information to fraudulently port numbers. Based on our\r\ninvestigation, we believe that the incident occurred on December 13-19, 2021.\"\r\nAfter hacking into UScellular's CRM system, the attackers could also view customers' account information, including their\r\nphone numbers and addresses.\r\n\"Information in customer accounts include name, address, PIN code and cellular telephone number(s) as well as information\r\nabout wireless services including service plan, usage and billing statements,\" UScellular said.\r\n\"Sensitive personal information, such as Social Security number and credit card information, is masked within the CRM\r\nsystem. At this time, we have no indication that there has been unauthorized access to your UScellular online user account.\"\r\nEmployee login credentials reset after the attack\r\nWhile UScellular did not say if any of its employees' accounts were compromised in this security breach, the company reset\r\nan undisclosed number of retail store login employee credentials.\r\nThe mobile carrier also reset the impacted customers' security questions, answers, and personal identification numbers (PIN)\r\nlinked to their accounts.\r\n\"Upon discovery of the incident, UScellular immediately disconnected the computer accessed by the unauthorized\r\nindividuals from the internet and requested immediate removal from the internet of the fraudulent websites used by the\r\nfraudsters as part of the scheme,\" UScellular added.\r\nImpacted UScellular customers are advised to be on the lookout for targeted phishing scams using personal information\r\nstolen from the company's CRM systems.\r\nThis is the second data breach that hit UScellular in 2021 after hackers were also able to gain access to the carrier's CRM\r\nsoftware in January 2021.\r\nJust as following the December breach, the threat actors were also able to successfully port some UScellular customers'\r\nnumbers which would allow them to steal two-factor authentication codes sent via text messages and, potentially, hijack the\r\nvictims' online accounts.\r\nA UScellular spokesperson was not available for comment when contacted by BleepingComputer earlier today,\r\nhttps://www.bleepingcomputer.com/news/security/uscellular-discloses-data-breach-after-billing-system-hack/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/uscellular-discloses-data-breach-after-billing-system-hack/\r\nhttps://www.bleepingcomputer.com/news/security/uscellular-discloses-data-breach-after-billing-system-hack/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/uscellular-discloses-data-breach-after-billing-system-hack/"
	],
	"report_names": [
		"uscellular-discloses-data-breach-after-billing-system-hack"
	],
	"threat_actors": [],
	"ts_created_at": 1775439075,
	"ts_updated_at": 1775791224,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d6b4c8389926a42da15b407a0941c0ba9130d7fd.pdf",
		"text": "https://archive.orkl.eu/d6b4c8389926a42da15b407a0941c0ba9130d7fd.txt",
		"img": "https://archive.orkl.eu/d6b4c8389926a42da15b407a0941c0ba9130d7fd.jpg"
	}
}