Apple Online Store Security Flaw Exposed PINs of T-Mobile Customers

A security flaw in Apple's online store exposed the account PINs of more than 72 million T-Mobile customers, reports BuzzFeed News.

The vulnerability was discovered by security researchers Phobia and Nicholas "Convict" Ceraolo, who also found a similar flaw in the website for phone insurance company Asurion that exposed AT&T account PINs.

Both Apple and Asurion fixed the website flaws that left the PINs vulnerable after learning about them from BuzzFeed News. Apple opted not to provide further comment on the situation, but told BuzzFeed News that it is "very grateful to the researchers who found the flaw."

tmobileapplepage

The page on Apple's site that let hackers brute force PINs, via BuzzFeed News

PINs, or passcodes, are numbers that are used as an additional account security measure by many carriers in the United States. Mobile device PINs are typically a last line of defense for a cellular account as both carrier websites and support staff will ask for the PIN for confirmation before making account changes.

SIM hacking, which uses social engineering to get carrier support staff to transfer a person's phone number to a new SIM, has become increasingly prevalent due to the number of accounts (bank, email, social media, etc.) that are tied to a person's phone number. A PIN is used as a defense mechanism against SIM hacking, which means exposed PINs can be particularly dangerous.

Accessing the T-Mobile PINs on Apple's website involved a brute force attack where a hacker used software to input multiple different numeric combinations to guess the proper one.

As BuzzFeed News explains, after initiating a T-Mobile iPhone purchase on the Apple online store and selecting monthly payment options through T-Mobile, Apple's site directs users to an authentication form asking for a T-Mobile number and account PIN or last four digits of a social security number (which most carriers use in place of a PIN when one has not been set).

The page allowed for infinite entry attempts into the PIN field, enabling the brute force attack that let hackers guess PINs associated with a T-Mobile phone number.

The security vulnerability appears to have been limited to T-Mobile accounts, as the same validation page for other carriers on Apple's site uses a rate limit that locks access to the form for 60 minutes after five to 10 incorrect entries. Given that the other carrier pages had rate limiting enabled, it's likely Apple made an error on the T-Mobile page.

According to Ceraolo, the vulnerability is likely due to an engineering mistake made when connecting T-Mobile's account validation API to Apple's website.

A similar vulnerability on Asurion's website exposed an unspecified number of AT&T account PINs. An AT&T spokesperson said that it is working with Asurion to investigate the issue and will "take any additional action that may be appropriate."

A phone number was required for both of these attacks, limiting the number of people who may have been impacted, but AT&T and T-Mobile customers who are concerned about their account safety should choose a new PIN.

Tags: AT&T, T-Mobile

Popular Stories

iCloud General Feature Redux

iPhone Users Who Pay for iCloud Storage Received a New Perk This Year

Sunday June 1, 2025 9:26 am PDT by
If you pay for iCloud storage on your iPhone, Apple introduced an additional perk for you this year, at no additional cost. The perk is the ability to create invitations in the Apple Invites app for the iPhone, which was released in the App Store in February. In the Apple Invites app, iCloud+ subscribers can create invitations for any occasion, such as birthday parties, graduations, baby...
WWDC 2025 Sleek Peek

Apple Shares New 'Sleek Peek' Teaser Ahead of WWDC 2025 Next Week

Monday June 2, 2025 8:22 am PDT by
WWDC 2025 is just one week away, with Apple's opening keynote scheduled to begin on Monday, June 9 at 10 a.m. Pacific Time. Ahead of the annual developer conference, Apple updated its WWDC page today with a new "Sleek peek" tagline, which replaces the original "On the horizon" tagline that it used over the past few weeks. The graphic for WWDC 2025 has also been updated. It is now a...
macOS Tahoe Render

macOS Tahoe Name Leaked Ahead of Apple's WWDC Event Next Week

Sunday June 1, 2025 7:08 am PDT by
The alleged name of macOS 26 (yes) has leaked. In his Power On newsletter today, Bloomberg's Mark Gurman said that macOS 26 will be named macOS Tahoe, after California's scenic Lake Tahoe. Apple previously named its Mac operating systems after big cats like Cheetah, Tiger, Leopard, and Lion. Starting with OS X Mavericks in 2013, however, Apple switched to California-themed names like...
iOS 18

What to Expect From iOS 18.6 as One of the Final Updates Before iOS 26

Monday June 2, 2025 12:33 pm PDT by
It has been three weeks as of today since Apple released iOS 18.5, and we are still waiting for the first iOS 18.6 beta to follow. Below, we outline everything we know about iOS 18.6 so far. Timing Apple's software engineers have been internally testing iOS 18.6 since late March, according to the MacRumors visitors logs. The first betas of iOS 13.6 through iOS 16.6 were all released...
iPhone 17 Pro Blue Feature Tighter Crop

iPhone 17 Pro Launching Later This Year With These 12 New Features

Tuesday May 27, 2025 9:10 am PDT by
While the iPhone 17 Pro and iPhone 17 Pro Max are not expected to launch until September, there are already plenty of rumors about the devices. Below, we recap key changes rumored for the iPhone 17 Pro models as of May 2025: Aluminum frame: iPhone 17 Pro models are rumored to have an aluminum frame, whereas the iPhone 15 Pro and iPhone 16 Pro models have a titanium frame, and the iPhone X ...
macOS Tahoe Render

WWDC 2025: What to Expect From macOS 26 Tahoe

Monday June 2, 2025 4:17 pm PDT by
WWDC is less than a week away, and as we ramp up to the big announcement, we're going to share details on what we know about each operating system. We're starting with the next-generation version of macOS, which Apple is apparently going to call macOS Tahoe. Name Since the current version of macOS is macOS 15, it would normally be followed by macOS 16, but Apple is changing its naming...
28 years later iphone 1

Filmmakers Used 20 iPhones at Once to Shoot '28 Years Later'

Friday May 30, 2025 7:27 am PDT by
Sony today provided a closer look at the iPhone rigs used to shoot the upcoming post-apocalyptic British horror movie "28 Years Later" (via IGN). With a budget of $75 million, Danny Boyle's 28 Years Later will become the first major blockbuster movie to be shot on iPhone. 28 Years Later is the sequel to "28 Days Later" (2002) and "28 Weeks Later" (2007), which depict the aftermath of a...

Top Rated Comments

mistasopz Avatar
89 months ago
But forum members told me that Apple had the best security. Well except for those times when they didn't. Like the root password gate where you didn't have to put a password in to gain root access.
Score: 41 Votes (Like | Disagree)
RoobyRoobyRoo Avatar
89 months ago
But forum members told me that Apple had the best security. Well except for those times when they didn't. Like the root password gate where you didn't have to put a password in to gain root access.
Having the best security =/= flawless security. No tech company is completely flawless. But go ahead and chastise Apple for not being absolutely perfect, because that's so productive.
Score: 24 Votes (Like | Disagree)
Doctor Q Avatar
89 months ago
Four digits isn't a very long PIN. Even if the software now locks access to the form for 60 minutes after five to 10 incorrect entries, it doesn't block the exploit, just slow it down.

It seems to me that a bot could try 10 guesses for one phone number, which would lock the form for that phone number, then immediately switch to another phone number. If the phone number is locked for the IP address, it could use another IP address too.

If so, let's try a little math here: Rather than a bot trying one phone number and 10,000 different PINs in rapid succession to break it, it could try five to ten PINs for every phone number it's working on in the first hour, then try another five to ten PINs for every phone number in the second hour, and so on. In as few as 42 days it could crack every phone number. If it was trying to crack 10,000 phone numbers, it would succeed on an average of 238 phone numbers per day. That's still pretty vulnerable.
Score: 17 Votes (Like | Disagree)
mi7chy Avatar
89 months ago
Apple don't care about security because even after several security incidents customers are brain washed into thinking Apple is flawless.
Score: 10 Votes (Like | Disagree)
zakarhino Avatar
89 months ago
Security issue after security issue for T-Mobile and many carriers in general. Remember when T-Mo Germany said they don't need to salt their passwords because their security is "that good"? Or when it was discovered that it's very easy to get access to a T-Mo account AND clone people's sims because T-Mo doesn't have very good security practices beyond asking for the last 4 of your SSN? I've heard stories of people phoning up carriers under the guise of being a store employee and they get access to all sorts of information without thorough identity verification!

I know Apple are the guys that purportedly screwed up here but when you look at T-Mobile's security in general, it doesn't have a very good track record, it should have never been possible for the Tmo verification API to allow unlimited requests without a time limit. These carriers need to seriously update their security practices. Just accepting the last 4 digits of your social security number is no longer a viable option.
Score: 8 Votes (Like | Disagree)
nvmls Avatar
89 months ago
Squeeze that privacy/security coin Timo!
Score: 6 Votes (Like | Disagree)