DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

NTT DoCoMo Releases Notice its been Breached, Apologizes for the credentials leaked

Posted on April 28, 2013 by Lee J

news-from-docomo-personal-information-outflow-of-some-customers-you-have-your-contract-docomo-usa-wireless-tm-news-ntt-docomoUpdated: Translation put together of the press release, credits to YEP A few days ago i did a report on a leak of data that has come from Japanese mobile phone giant DoCoMo that contains credential leak. Over the past few days this site alone has had tens of thousands of hits in relation to the leak and now on the 27th DoCoMo has published a press release or notice on its main website in relation to this data leak. The press release is written in Japanese and poorly translates to English but you get the idea of what is going on anyway. The have made announcement that this data comes from a third party service and does not match the data held by DoCoMo. The third party service which has not been named appears to be a shop (unsure if its online or offline) that requires people to give full credentials when registering. At the end of the press release DoCoMo goes on to state that 1,805 customers have been affected and that they are sorry for any worry, inconvenience caused and they apologize deeply. Going a bit deeper a japanese blog which appears to of done a bit of investigating to this matter has stated that DoCoMo stated the following which just makes me laugh, "Unauthorized access from the outside is not technically possible". Properly translated:> Notice from NTT DoCoMo Regarding a leak of personal information concerning a number of customers who have a contract with "DOCOMO USA Wireless TM" April 27, 2013 hank you for your continued use of NTT DoCoMo services and products. It came to light on March 26th (US local time) that the personal information of a number of customers with a contract with the US-based mobile phone service "DOCOMO USA Wireless" provided by NTT DOCOMO USA, Inc. (hereafter, DoCoMo USA), the US subsidiary of DoCoMo, have been leaked as a result of unauthorized access from an external source. DoCoMo USA will be contacting affected customers individually, and notifying them of how to deal with this matter going forward. Note that the above-mentioned mobile phone services are separate to those services provided by NTT DoCoMo domestically within Japan, and no information has been leaked concerning the domestic customers of NTT DoCoMo itself. The items of personal information leaked and number of customers known to be affected to date are as shown below. → Leaked personal information • Customers who completed an application for DoCoMo USA Wireless on the DoCoMo USA online application website. – Items of information: "Customer name", "Address", "Date of birth", "Email address", "Credit card-related information (Name on card, Card number, Card issuer, Expiry date)". – Affected customers: 403 • Customers who completed an application for DoCoMo USA Wireless in part in a store. – Items of information: "Phone number", "Service usage plan", "Contract site", "Account number". (Other information including names has not been leaked.) – Affected customers: 1,805 We apologize deeply for the concern and inconvenience caused to our customers. [Contact for customer inquiries] NTT DOCOMO USA, Inc. Tel: +1-848-702-0806 (International call from inside Japan) e-mail: [email protected]

Source: https://www.nttdocomo.co.jp/info/notice/page/130427_00_m.html (IN JAPANESES)

Category: Breach Incidents

Post navigation

← Laptop with Orthopedic Physician Associates' patient data stolen from car
Report: Utah’s health data breach cost a costly mistake →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.